<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.3.3) -->
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-teas-5g-ns-ip-mpls-09" category="info" consensus="true" submissionType="IETF" tocDepth="2" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="Implementing 5G Transport Slices">A Realization of Network Slices for 5G Networks Using Current IP/MPLS Technologies</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-ns-ip-mpls-09"/>
    <author fullname="Krzysztof G. Szarkowicz" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Wien</city>
          <country>Austria</country>
        </postal>
        <email>kszarkowicz@juniper.net</email>
      </address>
    </author>
    <author fullname="Richard Roberts" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <country>France</country>
        </postal>
        <email>rroberts@juniper.net</email>
      </address>
    </author>
    <author fullname="Julian Lucek">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>London</city>
          <country>United Kingdom</country>
        </postal>
        <email>jlucek@juniper.net</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair" role="editor">
      <organization>Orange</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <postal>
          <street>Ronda de la Comunicacion, s/n</street>
          <city>Madrid</city>
          <country>Spain</country>
        </postal>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
        <uri>http://lmcontreras.com/</uri>
      </address>
    </author>
    <date year="2024" month="July" day="25"/>
    <area>Routing</area>
    <workgroup>TEAS</workgroup>
    <keyword>L3VPN</keyword>
    <keyword>L2VPN</keyword>
    <keyword>Slice Service</keyword>
    <abstract>
      <?line 181?>

<t>Slicing is a feature that was introduced by the 3rd Generation Partnership Project (3GPP) in mobile networks. Realization of 5G slicing implies requirements for all mobile domains, including the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN).</t>
      <t>This document describes a Network Slice realization model for IP/MPLS networks with a focus on the Transport Network fulfilling 5G slicing connectivity service objectives. The realization model reuses many building blocks currently commonly used in service provider networks.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Traffic Engineering Architecture and Signaling Working Group mailing list (teas@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/teas/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/5g-slice-realization"/>.</t>
    </note>
  </front>
  <middle>
    <?line 188?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document focuses on network slicing for 5G networks, covering the connectivity between Network Functions (NFs) across multiple domains such as edge clouds, data centers, and the Wide Area Network (WAN). The document describes a Network Slice realization approach that fulfills 5G slicing requirements by using existing IP/MPLS technologies to optimally control connectivity Service Level Agreements (SLAs) offered for 5G slices. To that aim, this document describes the scope of the Transport Network in 5G architectures (<xref target="sec-scope"/>), disambiguates 5G Network Slicing versus Transport Network Slicing (<xref target="sec-5gtn"/>), draws the perimeter of the various orchestration domains to realize slices (<xref target="sec-orch"/>), and identifies the required coordination between these orchestration domains for adequate setup of Attachment Circuits (ACs) (<xref target="sec-tn-nsi"/>).</t>
      <t>This work is compatible with the framework defined in <xref target="RFC9543"/> which describes network slicing in the context of networks built from IETF technologies. Specifically, this document explains how RFC 9543 Network Slices are realized within provider networks and how such slices are stitched to Transport Network resources in a customer site in the context of Transport Network Slices (<xref target="fig-end-to-end"/>).
Concretely, the realization of an RFC 9543 Network Slice (i.e., connectivity with performance commitments) involves the provider network and partially the AC (the PE-side of the AC). This document assumes that the customer site infrastructure is over-provisioned and involves short distances (low latency) where basic QoS/scheduling logic is sufficient to comply with the Service Level Objectives (SLOs).</t>
      <figure anchor="fig-end-to-end">
        <name>Transport Network Slice &amp;  RFC 9543 Network Slice Scopes</name>
        <artwork align="center"><![CDATA[
      |------------------TN Slice------------------|

                        RFC 9543 Network Slice
                        +-----SDP Type 3----+
                        |  +- SDP Type 4-+  |
                        |  |             |  |
                        v  v             v  v
  +------------+          +---------------+         +------------+
  |  Customer  |          |    Provider   |         |  Customer  |
  |   Site 1   |          |    Network    |         |   Site 2   |
  |            |        +-+--+          +-+--+      |            |
  |+---+    +--+-+  AC  |    |          |    | AC +-+-+          |
  ||NF +....+ CE +------+ PE |          | PE +----+NF |          |
  |+---+    +--+-+      |    |          |    |    +-+-+          |
  |            |        +-+--+          +-+--+      |            |
  |            |          |               |         |            |
  +------------+          +---------------+         +------------+
]]></artwork>
      </figure>
      <t>The realization approach described in this document is typically triggered by Network Slice Service requests. How a Network Slice Service request is placed for realization, including how it is derived from a 5G Slice Service request, is out of scope. Mapping considerations between 3GPP and IETF Network Slice Service (e.g., mapping of service parameters) are discussed, e.g., in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
      <t>The 5G control plane uses the Single Network Slice Selection Assistance Information (S-NSSAI) for slice
identification <xref target="TS-23.501"/>. Because S-NSSAIs are not visible to the transport domain, 5G domains can expose the 5G slices to the transport
domain by mapping to explicit data plane identifiers (e.g., Layer 2, Layer 3, or Layer 4). The realization of the mapping between customer sites and provider networks is refered to as the "hand-off". <xref target="sec-handoff-domains"/> lists a set of such hand-off methods.</t>
      <t>The realization model described in this document uses a set of building blocks commonly used in service provider networks. Concretely, the model uses (1) Layer 2 Virtual Private Network (L2VPN) <xref target="RFC4664"/> and/or Layer 3 Virtual Private Network (L3VPN) <xref target="RFC4364"/> service instances for logical separation, (2) fine-grained resource control at the Provider Edges (PEs), (3) coarse-grained resource control at within the provider network, and (4) capacity management. More details are provided in Sections <xref format="counter" target="sec-over-rea-model"/>, <xref format="counter" target="sec-qos-map"/>, <xref format="counter" target="transport-plane-mapping-models"/>, and <xref format="counter" target="sec-capacity-planning"/>.</t>
      <t>This realization model uses a single Network Resource Partition (NRP) (<xref section="7.1" sectionFormat="of" target="RFC9543"/>). The applicability to multiple NRPs is out of scope.</t>
      <t>Although this document focuses on 5G, the realizations are not fundamentally constrained by the 5G use case. The document is not intended to be a BCP and does not claim to specify mandatory mechanisms to realize network slices. Rather, a key goal of the document is to provide pragmatic implementation approaches by leveraging existing readily-available, widely-deployed techniques. The document is also intended to align the mobile and the IETF perspectives of slicing from a realization perspective.</t>
      <t>A brief 5G overview is provided in <xref target="sec-5g-overview"/> for the reader's convenience. For a definitive description of 3GPP network architectures, the reader should refer to <xref target="TS-23.501"/>. More  details can be found in <xref target="_5G-Book"/>.</t>
    </section>
    <section anchor="definitions">
      <name>Definitions</name>
      <t>The document uses the terms defined in <xref target="RFC9543"/>. See <xref target="sec-ref-design"/> for the contextualization of some of these terms.</t>
      <t>An extended list of abbreviations used in this document is provided in <xref target="ext-abbr"/>.</t>
      <t>"5G Network Slicing" (or "5G Network Slice") refers to "Network Slicing" (or "Network Slice") as defined in the 3GPP <xref target="TS-28.530"/>.</t>
      <t>This document makes use of the following terms:</t>
      <dl>
        <dt>Customer:</dt>
        <dd>
          <t>An entity that is responsible for managing and orchestrating the end-to-end 5G Mobile Network, notably the Radio Access Network (RAN) and Core Network (CN).</t>
        </dd>
        <dt/>
        <dd>
          <t>This entity is distinct from the customer of a 5G Network Slice Service.</t>
        </dd>
        <dt>Customer site:</dt>
        <dd>
          <t>A customer manages and deploys 5G NFs (e.g., gNodeB (gNB) and 5G Core (5GC)) in customer sites. A customer site can be either a physical or a virtual location.</t>
        </dd>
        <dt/>
        <dd>
          <t>Examples of customer sites are a customer private locations (Point of Presence (PoP), Data Center (DC)), a Virtual Private Cloud (VPC), or servers hosted within the provider network or colocation service.</t>
        </dd>
        <dt>Provider:</dt>
        <dd>
          <t>An entity responsible for interconnecting customer sites.</t>
        </dd>
        <dt/>
        <dd>
          <t>A provider orchestrates and manages a provider network.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-5g">
      <name>5G Network Slicing Integration in Transport Networks</name>
      <section anchor="sec-scope">
        <name>Scope of the Transport Network</name>
        <t><xref target="sec-5g-overview"/> provides an overview of 5G network building blocks: the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN). The Transport Network is defined by the 3GPP as:</t>
        <blockquote>
          <t>"part supporting connectivity within and between CN and RAN parts" (Section 1 of <xref target="TS-28.530"/>).</t>
        </blockquote>
        <t>As discussed in Section 4.4.1 of <xref target="TS-28.530"/>, the 3GPP management system does not directly control the Transport Network: it is considered as a non-3GPP managed system.</t>
        <blockquote>
          <t>"The non-3GPP part includes TN parts. The 3GPP management system provides the network slice requirements to the corresponding management systems of those non-3GPP parts, e.g. the TN part supports connectivity within and between CN and AN parts." (Section 4.4.1 of <xref target="TS-28.530"/>)</t>
        </blockquote>
        <t>In practice, the TN may not map to a monolithic architecture and management domain. It is frequently segmented, non-uniform, and managed by different entities. For example, <xref target="fig-1"/> depicts an NF instance that is deployed in an edge data center (DC) connected to an NF located in a Public Cloud via a WAN (e.g., MPLS-VPN service). In this example, the TN can be seen as an abstraction representing an end-to-end connectivity based upon three distinct domains: DC, WAN, and Public Cloud. A model for the Transport Network based on orchestration domains is introduced in <xref target="sec-orch"/>.</t>
        <figure anchor="fig-1">
          <name>An Example of Transport Network Decomposition</name>
          <artwork align="center"><![CDATA[
      +----------------------------------+       
 +----+      5G RAN or Core Network      +----+
 |    +----------------------------------+    | 
 |                                            | 
 v                                            v 
+--+  +----------------------------------+  +--+
|NF+--+        Transport Network         +--+NF|
+--+  +--+---------------+------------+--+  +--+
         |               |            |       
         v               v            v       
 +-- Data Center -+  +-MPLS VPN-+   +-Public-+   
 |                |  | Backbone |   |  Cloud |  
 |.-----. .-----. | +--+      +--+ +--+      |  
 |'-----' '-----' | |PE|      |PE| |GW|      |
 |.-. .-. .-. .-. | +--+      +--+ +--+      |
 |'-' '-' '-' '-' |  |          |   |        |
 |                | +--+      +--+  |        |
 |                | |PE|      |PE|  |        |
 |                | +--+      +--+  |        |
 |                |  |          |   |        |
 +----------------+  +----------+   +--------+
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-5gtn">
        <name>5G Network Slicing versus Transport Network Slicing</name>
        <t>Network slicing has a different meaning in the 3GPP mobile world and transport
world. This difference can be seen from the descriptions below that set out
the objectives of 5G Network Slicing (<xref target="sec-5g-slicing"/>) and Transport Network
Slicing (<xref target="sec-tn-slicing"/>). These descriptions are not intended to be exhaustive.</t>
        <section anchor="sec-5g-slicing">
          <name>5G Network Slicing</name>
          <t>5G Network Slicing is defined by the 3GPP  <xref target="TS-28.530"/> as an approach:</t>
          <blockquote>
            <t>"where logical networks/partitions are created, with appropriate isolation, resources and optimized topology to serve a purpose or service category (e.g. use case/traffic category, or for MNO internal reasons) or customers (logical system created "on demand")."</t>
          </blockquote>
          <t>These resources are from the TN, RAN, CN domains, and the underlying infrastructure.</t>
          <t>Section 3.1 of <xref target="TS-28.530"/> defines 5G Network Slice as:</t>
          <blockquote>
            <t>"a logical network that provides specific network capabilities and network characteristics, supporting various service properties for network slice customers."</t>
          </blockquote>
        </section>
        <section anchor="sec-tn-slicing">
          <name>Transport Network Slicing</name>
          <t>The term "TN slice" refers to a slice in the Transport Network domain of the 5G architecture.</t>
          <t>The objective of Transport Network Slicing is to isolate,
guarantee, or prioritize Transport Network resources for Slice Services. Examples of such resources are:
buffers, link capacity, or even Routing Information Base (RIB) and Forwarding Information Base (FIB).</t>
          <t>Transport Network Slicing provides various degrees of sharing of resources between slices. For example, the network capacity can be shared by all slices, usually with a guaranteed minimum per slice, or each individual slice can be allocated dedicated network capacity. Parts of a given network may use the former, while others use the latter. For example, in order to satisfy local engineering guidelines and specific service requirements, shared TN resources could be provided in the backhaul (or midhaul), and dedicated TN resources could be provided in the midhaul (or backhaul). The capacity partitioning strategy is deployment specific.</t>
          <t>There are different components to implement TN slices based upon
mechanisms such as Virtual Routing and Forwarding instances (VRFs)
for logical separation, Quality of Service (QoS), and Traffic
Engineering (TE). Whether all or a subset of these components are enabled is a deployment choice.</t>
        </section>
      </section>
      <section anchor="sec-ref-design">
        <name>Transport Network Reference Design</name>
        <t><xref target="fig-tn-arch"/> depicts the reference design used in this document for modelling the Transport Network based on management perimeters (Customer vs. Provider).</t>
        <figure anchor="fig-tn-arch">
          <name>Reference Design with Customer Site and Provider Network</name>
          <artwork align="center"><![CDATA[
      Customer                 Provider                     Customer
   Orchestration            Orchestration                 Orchestration
      Domain                   Domain                       Domain                                                                          
+----------------+      +---------------------+       +----------------+
|    Customer    |      |  Provider Network   |       |    Customer    |
|      Site 1    |      |                     |       |      Site 2    |
|          +----+|      |+----+         +----+|       |+----+          |
|+--+      |    ||  AC  ||    |         |    ||  AC   || NF |          |
||NF|......| CE +--------+ PE |         | PE +---------+(CE)|          |
|+--+      |    ||      ||    |         |    ||       ||    |          |
|          +----+|      |+----+         +----+|       |+----+          |
|                |      |                     |       |                |
+----------------+      +---------------------+       +----------------+
                                                                          
     <-----------------Transport Network--------------->
]]></artwork>
        </figure>
        <t>The description of the main components shown in <xref target="fig-tn-arch"/> is provided in the following subsections.</t>
        <section anchor="sec-cs">
          <name>Customer Site</name>
          <t>On top of 5G NFs, a customer may manage additional TN elements (e.g., servers, routers, and switches) within a customer site.</t>
          <t>NFs may be hosted on a CE, directly connected to a CE, or be located multiple IP hops from a CE.</t>
          <t>The orchestration of the TN within a customer site involves a set of controllers for automation purposes (e.g., Network Functions Virtualization Infrastructure (NFVI), Container Network Interface (CNI), Fabric Managers, or Public Cloud APIs). It is out of scope to document how these controllers are implemented.</t>
        </section>
        <section anchor="sec-ce">
          <name>Customer Edge (CE)</name>
          <t>A CE is a function that provides logical connectivity of a customer site (<xref target="sec-cs"/>) to the provider network (<xref target="sec-pn"/>). The logical connectivity is enforced at Layer 2 and/or Layer 3 and is denominated an Attachment Circuit (AC) (<xref target="sec-ac"/>). Examples of CEs include TN components (e.g., router, switch, and firewalls) and also 5G NFs (i.e., an element of the 5G domain such as Centralized Unit (CU), Distributed Unit (DU), or User Plane Function (UPF)).</t>
          <t>A CE is typically managed by the customer, but it can also be co-managed with the provider. A co-managed CE is orchestrated by both the customer and the provider. In this case, the customer and provider usually have control on distinct device configuration perimeters. A co-managed CE has both PE and CE functions and there is no strict AC connection, although one may consider that the AC stitching logic happens internally within the CE itself. The provider manages the AC between the CE and the PE.</t>
          <t>This document generalizes the definition of a CE with the introduction of "Distributed CE"; that is, the logical connectivity is realized by configuring multiple devices in the customer domain. The CE function is distributed. An example of distributed CE is the realization of an interconnection using a L3VPN service based on a distributed CE composed of a switch (Layer 2) and a router (Layer 3) (<xref target="fig-distribute-ce"/>). Another example of distributed CE is shown in <xref target="fig-50"/>.</t>
          <figure anchor="fig-distribute-ce">
            <name>Example of Distributed CE</name>
            <artwork align="center"><![CDATA[
+--------------+                    +--------------+
|   Customer   |                    |   Provider   |
|     Site     |                    |    Network   |
|.................                  |              |
||+-----+ +----+ |               +----+            |
|||     | |    ==================     |            |
|||     +------------AC---------+ PE  |            |
||| RTR | | SW ==================     |            |
||+-----+ +----+ |               +----+            |
|'..Distributed..'                  |              |
|       CE     |                    |              |
+--------------+                    +--------------+
]]></artwork>
          </figure>
          <t>While in most cases CEs connect to PEs using IP (e.g., VLANs subinterface on a Layer 3 interface), a CE may also connect to the provider network using other technologies such as MPLS -potentially over IP tunnels- or Segment Routing over IPv6 (SRv6) <xref target="RFC8986"/>. The CE has thus awareness of provider services configuration (e.g., control plane identifiers such as Route Targets (RTs) and Route Distinguishers (RDs)). However, the CE is still managed by the customer and the AC is based on MPLS or SRv6 data plane technologies. The complete termination of the AC within the provider network may happen on distinct routers: this is another example of distributed PE. Service-aware CEs are used, for example, in the deployments discussed in Sections <xref format="counter" target="sec-10b"/> and <xref format="counter" target="sec-10c"/>.</t>
        </section>
        <section anchor="sec-pn">
          <name>Provider Network</name>
          <t>A provider uses a provider network to interconnect customer sites. This document assumes that the provider network is based on IP, MPLS, or both.</t>
        </section>
        <section anchor="sec-pe">
          <name>Provider Edge (PE)</name>
          <t>PE is a device managed by a provider that is connected to a CE. The connectivity between a CE and a PE is achieved using one or multiple ACs (<xref target="sec-ac"/>).</t>
          <t>This document generalizes the PE definition with the introduction of "Distributed PE"; that is, the logical connectivity is realized by configuring multiple devices in the provider network (i.e., provider orchestration domain). The PE function is distributed.</t>
          <t>An example of a distributed PE is the "Managed CE service". For example, a provider delivers VPN services using CEs and PEs which are both managed by the provider (case (i) in <xref target="fig-50"/>). The managed CE can also be a Data Center Gateway as depicted in the example (ii) of <xref target="fig-50"/>. A provider-managed CE may attach to CEs of multiple customers. However, this device is part of the provider network.</t>
          <figure anchor="fig-50">
            <name>Examples of Distributed PE</name>
            <artwork align="center"><![CDATA[
+--------------+                    +--------------+
|   Customer   |                    |   Provider   |
|     Site     |                    |    Network   |
|              |                .................  |
|          +----+               |+----+   +----+|  |
|          |    ==================Mngd|   |    ||  |
|          | CE +--------AC------+ CE +---+ PE ||  |
|          |    ==================    |   |    ||  |
|          +----+               |+----+   +----+|  |
|              |                '..Distributed..'  |
|              |                    |  PE          |
+--------------+                    +--------------+
                  (i) Distributed PE

+--------------+                    +--------------+
|   Customer   |                    |   Provider   |
|     Site     |                    |    Network   |
|  ..................           .................. |
|  |    IP Fabric   |           |+----+   +----+ | |
|  |.-----. .-----. ============== DC |   |    | | |
|  |'-----' '-----' +-----AC-----+ GW +---+ PE | | |
|  |.-. .-. .-. .-. ==============    |   |    | | |
|  |'-' '-' '-' '-' |           |+----+   +----+ | |
|  '...Distributed..'           '...Distributed..' |
|          CE  |                    |  PE          |
|              |                    |              |
+--Data Center-+                    +--------------+
              (ii) Distributed PE and CE
]]></artwork>
          </figure>
          <t>In subsequent sections of this document, the terms CE and PE are used for both single and distributed devices.</t>
        </section>
        <section anchor="sec-ac">
          <name>Attachment Circuit (AC)</name>
          <t>The AC is the logical connection that attaches a CE (<xref target="sec-ce"/>) to a PE (<xref target="sec-pe"/>). A CE is connected to a PE via one or multiple ACs.</t>
          <t>This document uses the concept of distributed CE and PE (Sections <xref format="counter" target="sec-ce"/>) and (<xref format="counter" target="sec-pe"/>) to consolidate a CE/AC/PE definition that is consistent with the orchestration perimeters (<xref target="sec-orch"/>). The CEs and PEs delimit respectively the customer and provider orchestration domains, while an AC interconnects these domains.</t>
          <t>For consistency with the AC data models terminology (e.g., <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/> and <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>), this document assumes that an AC is configured on a "bearer", which represents the underlying connectivity. For example, the bearer is illustrated with "===" in Figures <xref format="counter" target="fig-distribute-ce"/> and <xref format="counter" target="fig-50"/>.</t>
          <t>An AC is technology-specific. Examples of ACs are Virtual Local Area Networks (VLANs) (AC) configured on a physical interface (bearer) or an Overlay VXLAN EVI (AC) configured on an IP underlay (bearer).</t>
          <t>Deployment cases where the AC is also managed by the provider are not discussed in the document because the setup of such an AC does not require any coordination between the customer and provider orchestration domains.</t>
          <aside>
            <t>In order to keep the figures simple, only one AC and single-homed CEs are represented. Also, the underlying bearers are not represented in most of the figures.
However, this document does not exclude the instantiation of multiple ACs between a CE and a PE nor the presence of CEs that are attached to more than one PE.</t>
          </aside>
        </section>
      </section>
      <section anchor="sec-orch">
        <name>Orchestration Overview</name>
        <section anchor="sec-5g-sli-arch">
          <name>5G End-to-End Slice Orchestration Architecture</name>
          <t>This section introduces a global framework for the orchestration of a 5G end-to-end slice (a.k.a. 5G Network Slice) with a zoom on TN parts. This framework helps to delimit the realization scope of RFC 9543 Network Slices and identify interactions that are required for the realization of such slices.</t>
          <t>This framework is consistent with the management coordination example shown in Figure 4.7.1 of <xref target="TS-28.530"/>.</t>
          <t>In reference to <xref target="_figure-orch"/>, a 5G End-to-End Network Slice Orchestrator (5G NSO) is responsible for orchestrating 5G Network Slices end-to-end. The details of the 5G NSO are out of the scope of this document. The realization of the 5G Network Slices spans RAN, CN, and TN. As mentioned in <xref target="sec-scope"/>, the RAN and CN are under the responsibility of the 3GPP Management System, while the TN is not. The orchestration of the TN is split into two sub-domains in conformance with the reference design in <xref target="sec-ref-design"/>:</t>
          <dl>
            <dt>Provider Network Orchestration domain:</dt>
            <dd>
              <t>As defined in <xref target="RFC9543"/>, the provider relies on a Network Slice Controller (NSC) to manage and orchestrate RFC 9543 Network Slices in the provider network. This framework permits to manage connectivity together with SLOs.</t>
            </dd>
            <dt>Customer Site Orchestration domain:</dt>
            <dd>
              <t>The Orchestration of TN elements of the customer sites relies upon a variety of  controllers (e.g., Fabric Manager, Element Management System, or Virtualized Infrastructure Manager (VIM)).</t>
            </dd>
          </dl>
          <t>A TN slice relies upon resources that can involve both the provider and customer TN domains. More details are provided in <xref target="sec-tn-nsi"/>.</t>
          <t>A TN slice might be considered as a variant of horizontal composition of Network Slices mentioned in Appendix A.6 of <xref target="RFC9543"/>.</t>
          <figure anchor="_figure-orch">
            <name>5G End-to-End Slice Orchestration with TN</name>
            <artwork align="center"><![CDATA[
                         +-----------+                          
                         |  5G NSO   |                          
                         +--+---+----+                          
                            |   |                               
                            v   |                               
              +---------------+ |                               
              | 3GPP domains  | |                               
  +-----------+ Orchestration +-|--------------------------+    
  |           | (RAN and CN)  | |                          |    
  |           +---------------+ |                          |    
  |                             |                          |    
  |    +------------------------|----------------------+   |    
  |    |TN Orchestration        |                      |   |    
  |    |        +------------------------------+       |   | 
  |    |        |               |              |       |   | 
  |    |        v               v              v       |   |    
  |    |+---------------++-----------++---------------+|   |    
  |    || Customer Site ||RFC9543 NSC|| Customer Site ||   |    
  |    || Orchestration ||           || Orchestration ||   |    
  |    |+---------------++-----------++---------------+|   |    
  |    +---|-------------------|---------------------|-+   |    
  |        |                   |                     |     |    
  |        |                   |                     |     |    
  |        v                   v                     v     |    
+-|-----------+         +-----------------+         +------|---+
| |           |         |    Provider     |         |      |   |
| v           |       +----+  Network  +----+      +----+  |   | 
|+--+     +----+   AC |    |           |    |  AC  | NF |<-+   | 
||NF+.....+ CE +------+ PE |           | PE +------+(CE)|      | 
|+--+     +----+      |    |           |    |      +----+      |
|             |       +----+           +----+       |          |
|  Customer   |         |                 |         | Customer |
|    Site     |         |                 |         |   Site   |
+-------------+         +-----------------+         +----------+
                              RFC 9543                          
                      |-----Network Slice---|                  
                                                                
    |--------------------TN Slice-------------------|                  
                                                                
]]></artwork>
          </figure>
          <t>The various orchestration depicted in <xref target="_figure-orch"/> encompass the 3GPP's Network Slice Subnet Management Function (NSSMF) mentioned, e.g., in Figure 5 of <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
        </section>
        <section anchor="sec-tn-nsi">
          <name>Transport Network Segments and Network Slice Instantiation</name>
          <t>This document focuses on deployments where the Service Demarcation Points (SDPs) are located per Types 3 and 4 of Figure 1 of <xref target="RFC9543"/>. The concept of distributed PE (<xref target="sec-pe"/>) assimilates CE-based SDPs defined in <xref section="5.2" sectionFormat="of" target="RFC9543"/> (i.e., Types 1 and 2) as SDP Type 3 or 4 in this document.</t>
          <t>In reference to the architecture depicted in <xref target="sec-5g-sli-arch"/>, the connectivity between NFs can be decomposed into three main segment types that are as follows:</t>
          <dl>
            <dt>Customer Site:</dt>
            <dd>
              <t>Either connects NFs located in the same customer site or connects an NF to a CE.</t>
            </dd>
            <dt/>
            <dd>
              <t>This segment may not be present if the NF is the CE. In this case the AC connects the NF to a PE.</t>
            </dd>
            <dt/>
            <dd>
              <t>The realization of this segment is driven by the 5G Network Orchestration (e.g., NFs instantiation) and the Customer Site Orchestration for the TN part.</t>
            </dd>
            <dt>Provider Network:</dt>
            <dd>
              <t>Represents the connectivity between two PEs. The realization of this segment is controlled by an NSC (<xref section="6.3" sectionFormat="of" target="RFC9543"/>).</t>
            </dd>
            <dt>Attachment Circuit:</dt>
            <dd>
              <t>The orchestration of this segment relies partially upon an NSC for the configuration of the AC on the PE customer-facing interfaces and the Customer Site Orchestration for the configuration of the AC on the CE.</t>
            </dd>
            <dt/>
            <dd>
              <t>PEs and CEs that are connected via an AC need to be
provisioned with consistent data plane and control plane information (VLAN-
IDs, IP addresses/subnets, BGP  Autonomous System (AS) Number, etc.). Hence, the realization of this
interconnection is technology-specific and requires coordination between the Customer Site Orchestration and an NSC. Automating the provisioning and management of the AC is thus key to automate the overall service provisioning. Aligned with <xref target="RFC8969"/>, this document assumes that this coordination is based upon standard YANG data models and APIs.</t>
            </dd>
            <dt/>
            <dd>
              <t>The provisioning of a Network Slice may rely on new or existing ACs.</t>
            </dd>
            <dt/>
            <dd>
              <t><xref target="_figure-4"/> is a basic example of a Layer 3 CE-PE link realization
with shared network resources (such as VLAN-IDs and IP prefixes) which
are passed between Orchestrators via a dedicated interface, e.g., the Network Slice Service Model (NSSM) <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> or the Attachment Circuit-as-a-Service (ACaaS) <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>.</t>
            </dd>
          </dl>
          <figure anchor="_figure-4">
            <name>Coordination of Transport Network Resources for the AC Provisioning</name>
            <artwork align="center"><![CDATA[
  +---------------+                   +------------------+ 
  |               |                   |   RFC9543 NSC    |
  | Customer Site |                   |                  |
  | Orchestration |    IETF APIs/DM   |(Provider Network |
  |               |<----------------->|  Orchestration)  |
  +---------------+                   +------------------+ 
                |                        |                
                |                        |                
+---------------|-+                    +-|---------------+
|               v |                    | v               |
| +--+      +--+.1|    192.0.2.0/31    |.0+--+           |
| |NF+......+CE+--------------------------+PE|           |
| +--+      +--+  |      VLAN 100      |  +--+           |
|    Customer     |                    |     Provider    |
|      Site       |                    |     Network     |
+-----------------+                    +-----------------+
                                                          
               |----------- AC -----------|
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="sec-mapping">
        <name>Mapping 5G Network Slices to Transport Network Slices</name>
        <t>There are multiple options for mapping 5G Network Slices to TN slices:</t>
        <ul spacing="normal">
          <li>
            <t>1 to N:
A single 5G Network Slice can be mapped to multiple TN slices (1 to N). For instance, consider the scenario depicted in <xref target="_figure-5"/>, illustrating the separation of the 5G control plane and user plane in TN slices for a single 5G Enhanced Mobile Broadband (eMBB) network slice. It is important to note that this mapping can serve as an interim step to M to N mapping. Further details about this scheme are described in <xref target="sec-firstslice"/>.</t>
          </li>
          <li>
            <t>M to 1:
 Multiple 5G Network Slices may rely upon the same TN slice.  In such a case, the Service Level Agreement (SLA) differentiation of slices
 would be entirely controlled at the 5G control plane, for example, with
 appropriate placement strategies: this use case is represented in
 <xref target="_figure-6"/>, where a User Plane Function (UPF) for the Ultra Reliable Low Latency Communication (URLLC) slice is
 instantiated at the edge cloud close to the gNB Centralized Unit User Plane (CU-UP) for
 better latency/jitter control, while the 5G control plane and the UPF
 for eMBB slice are instantiated in the regional cloud.</t>
          </li>
          <li>
            <t>M to N:
 The 5G to TN slice mapping combines both
 approaches with a mix of shared and dedicated associations.  </t>
            <t>
In this scenario, a subset of the TN slices can be intended for sharing by multiple 5G Network Slices (e.g., the control plane TN slice is shared by multiple 5G network Slices).  </t>
            <t>
In practice, for operational and scaling reasons, typically M to N would be used, with M &gt;&gt; N.</t>
          </li>
        </ul>
        <figure anchor="_figure-5">
          <name>1 (5G Slice) to N (RFC 9543 Network Slice) Mapping</name>
          <artwork align="center"><![CDATA[
+---------------------------------------------------------------+
|                        5G Slice eMBB                          |
|            +------------------------------------+             |
| +-----+ N3 | +---------------------------------+|  N3 +-----+ |
| |CU-UP+------+ RFC 9543 Network Slice UP_eMBB  +------+ UPF | |
| +-----+    | +---------------------------------+|     +-----+ |
|            |                                    |             |
| +-----+ N2 | +---------------------------------+|  N2 +-----+ |  
| |CU-CP+------+    RFC 9543 Network Slice CP    +------+ AMF | |
| +-----+    | +---------------------------------+|     +-----+ |
+------------|------------------------------------|-------------+
             |                                    |              
             |           Transport Network        |          
             +------------------------------------+
]]></artwork>
        </figure>
        <figure anchor="_figure-6">
          <name>N (5G Slice) to 1 (RFC 9543 Network Slice) Mapping</name>
          <artwork align="center"><![CDATA[
                  +-------------+                                  
                  |  Edge Cloud |                                  
                  |             |                                  
                  | +---------+ |                                  
                  | |UPF_URLLC| |                                  
                  | +-----+---+ |                                  
                  +-------|-----+                                  
+---------------+ +-------|----------------------+                
|   Cell Site   | | +-----+--------------------+ | +--------------+
|               | | |                            | |   Regional   |
| +-----------+ | | |                          | | |     Cloud    |
| |CU-UP_URLLC+-----+                          | | | +-----------+| 
| +-----------+ | | |     RFC 9543 Network     +-----+  5GC CP  | |
|               | | |        Slice ALL         | | | +-----------+| 
| +-----------+ | | |                          | | |              |
| |CU-UP_eMBB +-----+                          | | | +-----------+  
| +-----------+ | | |                          +-----+ UPF_eMBB | |
+---------------+ | |                          | | | +-----------+|  
                  | +--------------------------+ | |              |
                  |                              | +--------------+
                  |      Transport Network       |                 
                  +------------------------------+
]]></artwork>
        </figure>
        <t>Note that the actual realization of the mapping depends on several
   factors, such as the actual business cases, the NF vendor
   capabilities, the NF vendor reference designs, as well as service
   provider or even legal requirements.</t>
        <t>Mapping approaches that preserve the 5G slice identification in the TN (e.g., <xref target="sec-ip-hof"/>) may simplify required operations to map back TN slices to 5G slices. However, such considerations are not detailed in this document because these are under the responsibility of the 3GPP orchestration domain.</t>
      </section>
      <section anchor="sec-firstslice">
        <name>First 5G Slice versus Subsequent Slices</name>
        <t>An operational 5G Network Slice incorporates both 5G control plane and user plane capabilities.
For instance, consider a slice based on split-CU in the RAN, both CU-UP and Centralized Unit Control Plane (CU-CP) need to be deployed along with the associated interfaces E1, F1-c, F1-u, N2, and N3 which are conveyed in the TN. In this regard, the creation of the "first slice" can be subject to a specific logic that does not apply to subsequent slices. Let us consider the example depicted in <xref target="_figure-7"/> to illustrate this deploloyment. In this example, the first 5G slice relies on the deployment of NF-CP and NF-UP functions together with two TN slices for control and user planes (INS-CP and INS-UP1). Next, the deployment of a second slice relies solely on the instantiation of a UPF (NF-UP2) together with a dedicated user plane TN slice (INS-UP2). In this example, the control plane of the first 5G slice is also updated to integrate the second slice: the TN slice (INS-CP) and Network Functions (NF-CP) are shared.</t>
        <t>At the time of writing (2024), Section 6.1.2 of <xref target="NG.113"/> specifies that the
   eMBB slice (SST-1 and no Slice Differentiator (SD)) should be supported globally.  This 5G
   slice would be the first slice in any 5G deployment.</t>
        <figure anchor="_figure-7">
          <name>First and Subsequent Slice Deployment</name>
          <artwork align="center"><![CDATA[
+---------------------------------------------------------------+
|                  +------------------------------+             |
|  1    +-----+    | +--------------------------+ |    +-----+  |
|  s S  |NF-CP+------+   CP TN Slice (TNS-CP)   +------+NF-CP|  |
|  t l  +-----+    | +--------------------------+ |    +-----+  |
|    i             |                              |             |
|  5 c  +-----+    | +--------------------------+ |    +-----+  |
|  G e  |NF-UP+------+  UP TN Slice (TNS-UP1)   +------+NF-UP|  |
|       +-----+    | +--------------------------+ |    +-----+  |
+------------------|------------------------------|-------------+
                   |                              |              
                   |      Transport Network       |          
                   +------------------------------+              
                      Deployment of first 5G slice               
                                  | |                            
                                  | |                            
                                --+ +--                           
                                 \   /                           
                                  \ /                                                      
+---------------------------------------------------------------+
|                  +------------------------------+             |
|  1    +-----+    | +--------------------------+ |    +-----+  |
|  s S  |NF-CP+------+   CP TN Slice (TNS-CP)   +------+NF-CP|  |
|  t l  +-----+    | +--------------------------+ |    +-----+  |
|    i             |                              |             |
|  5 c  +-----+    | +--------------------------+ |    +-----+  |
|  G e  |NF-UP+------+  UP TN Slice (TNS-UP1)   +------+NF-UP|  |
|       +-----+    | +--------------------------+ |    +-----+  |
+------------------|------------------------------|-------------+
                   |                              |              
+------------------|------------------------------|-------------+
|  2               |                              |             |
|  n S  +------+   | +--------------------------+ |   +------+  |
|  d l  |NF-UP2+-----+  UP TN Slice (TNS-UP2)   +-----+NF-UP2|  |
|    i  +------+   | +--------------------------+ |   +------+  |
|  5 c             |                              |             |
|  G e             |                              |             |
+------------------|------------------------------|-------------+
                   |                              |              
                   |      Transport Network       |          
                   +------------------------------+                 
    Deployment of additional 5G slice with shared Control Plane
]]></artwork>
        </figure>
        <t>Overall, policies might be provided by an operator (e.g., to Network Slice Controllers) to indicate whether the same or dedicated CP NFs are allowed when processing a new slice creation request. Providing such a policy is meant to better automate the realization of 5G slices and minimize the realization delay that might be induced by extra cycles to seek for operator validation.</t>
      </section>
      <section anchor="sec-over-rea-model">
        <name>Overview of the Transport Network Realization Model</name>
        <t>The realization model described in this document is depicted in
   <xref target="_figure-high-level-qos"/>. The following building blocks are used:</t>
        <ul spacing="normal">
          <li>
            <t>L2VPN <xref target="RFC4664"/> and/or L3VPN <xref target="RFC4364"/> service instances for logical separation:  </t>
            <t>
This realization model of transport for 5G slices assumes Layer 3
delivery for midhaul and backhaul transport connections, and a
Layer 2 or Layer 3 delivery for
fronthaul connections. Enhanced Common Public Radio Interface (eCPRI) <xref target="ECPRI"/> supports both delivery models. L2VPN/L3VPN service instances might be
used as a basic form of logical slice separation.  Furthermore, using
service instances results in an additional outer header (as packets
are encapsulated/decapsulated at the nodes hosting service instances) providing clean discrimination between 5G QoS and TN
QoS, as explained in <xref target="sec-qos-map"/>.  </t>
            <t>
The use of VPNs for realizing Network Slices is briefly described in Appendix A.4 of <xref target="RFC9543"/>.</t>
          </li>
          <li>
            <t>Fine-grained resource control at the PE:  </t>
            <t>
This is sometimes called 'admission control' or 'traffic
conditioning'.  The main purpose is the enforcement of the
bandwidth contract for the slice right at the edge of the
provider network where the traffic is handed-off between the
customer site and the provider network.  </t>
            <t>
The method used here is granular ingress policing (rate limiting)
to enforce contracted bandwidths per slice and, potentially, per
traffic class within the slice.  Traffic above the enforced rate might be
immediately dropped, or marked as high drop-probability traffic,
which is more likely to be dropped somewhere inside the provider network if
congestion occurs.  In the egress direction at the PE node,
hierarchical schedulers/shapers can be deployed,
providing guaranteed rates per slice, as well as guarantees per
traffic class within each slice.  </t>
            <t>
For managed CEs, edge admission control can be distributed between CEs
and PEs, where a part of the admission control is implemented on the CE
and other part of the admission control is implemented on the PE.</t>
          </li>
          <li>
            <t>Coarse-grained resource control at the transit (non-attachment
circuits) links in the provider network, using a single NRP (called "base NRP" in <xref target="_figure-high-level-qos"/>), spanning the entire provider network.
Transit nodes in the provider network do not maintain any state of individual slices.
Instead, only a flat (non-hierarchical) QoS model is used on
transit links in the provider network, with up to 8 traffic classes.  At the PE,
traffic-flows from multiple slice services are mapped
to the limited number of traffic classes used on provider network transit links.</t>
          </li>
          <li>
            <t>Capacity planning/management for efficient usage of provider network resources:  </t>
            <t>
The role of capacity management is to ensure the provider network
capacity can be utilized without causing any bottlenecks.  The
methods used here can range from careful network planning, to
ensure a more or less equal traffic distribution (i.e., equal cost load
balancing), to advanced TE techniques, with or
without bandwidth reservations, to force more consistent load
distribution even in non-ECMP friendly network topologies. See also <xref section="8" sectionFormat="of" target="RFC9522"/>).</t>
          </li>
        </ul>
        <figure anchor="_figure-high-level-qos">
          <name>Resource Allocation Slicing Model with a Single NRP</name>
          <artwork align="center"><![CDATA[
             ..............................................
            :                   Base NRP                   :
      +-----:----+                                    +----:-----+
      | PE  :    |                                    |    :  PE |
-- -- |- -- -- --| - -- -- -- -- -- -- -- -- -- -- -- | -- -- -- |
 N    *<---+     |                                    |     +--->*
 S    |    |     |       +-----+        +-----+       |     |    |
 #    *<---+     |       |  P  |        |  P  |       |     +--->*
 1    |    |     |       |     |        |     |       |     |    |
== == |    +---->o<----->o<--->o<------>o---->o<----->o<----|    |
 N    |    |     |       |     |        |     |       |     |    |
 S    *<---+     |       |     |        |     |       |     +--->*
 #    |    |     |       +-----+        +-----+       |     |    |
 2    *<---+     |                                    |     +--->*
-- -- |- -- -- --|-- -- -- -- -- -- -- -- -- -- -- -- | -- -- -- |
      |     :    |                                    |    :     |
      +-----:----+                                    +----:-----+
            :                                              :      
            '..............................................'

    * SDP, with fine-grained QoS (dedicated resources per Network Slice)
    o Coarse-grained QoS, with resources shared by all Network Slices
  ... Base NRP
-- -- Network Slice
]]></artwork>
        </figure>
        <t>P nodes shown in <xref target="_figure-high-level-qos"/> are routers that do no interface with customer devices. See <xref section="5.3.1" sectionFormat="of" target="RFC4026"/>.</t>
        <t>This document does not describe in detail how to manage an L2VPN or L3VPN, as this is already well-documented. For example, the reader may refer to <xref target="RFC4176"/> and <xref target="RFC6136"/> for such details.</t>
      </section>
    </section>
    <section anchor="sec-handoff-domains">
      <name>Hand-off Between Domains</name>
      <t>The 5G control plane relies upon 32-bit S-NSSAIs for slice
   identification. The S-NSSAI is not visible to the transport domain.
   So instead, 5G network functions can expose the 5G slices to the transport
   domain by mapping to explicit Layer 2 or Layer 3 identifiers, such as VLAN-IDs, IP
   addresses, or Differentiated Services Code Point (DSCP) values. These section lists few hand-off methods for slice mapping
   between customer sites and provider networks.</t>
      <t>More details about the mapping between 3GPP and RFC 9543 Network Slices is provided in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
      <t><!---
   That document includes additional methods for mapping 5G slices to TN slices (e.g., source UDP port number), but these
   methods are not discussed here because of the shortcomings of these methods (e.g., load balancing, NAT).
   -->
      </t>
      <section anchor="sec-vlan-handoff">
        <name>VLAN Hand-off</name>
        <t>In this option, the RFC 9543 Network Slice, fulfilling connectivity
   requirements between NFs that belong to a 5G slice, is represented at an SDP
   by a VLAN ID (or double VLAN IDs, commonly known as QinQ), as depicted in <xref target="_figure-vlan-hand-off"/>.</t>
        <figure anchor="_figure-vlan-hand-off">
          <name>Example of 5G Slice with VLAN Hand-off Providing End-to-End Connectivity</name>
          <artwork align="center"><![CDATA[
VLANs representing slices           VLANs representing slices       
                                                                    
           |     +------------------+     |             |           
           |     |                  |     |             |           
+------+   v   +-+---+ Provider +---+-+   v   +-----+   v   +------+
|      +-------+*    |          |    *+-------+     +.......+      |
| NF   +-------+* PE |          | PE *+-------+L2/L3+.......+   NF |
|      +-------+*    |          |    *+-------+     +.......+      |
+------+   AC  +-+---+  Network +---+-+   AC  +-----+       +------+
                 |                  |                               
                 +------------------+
                                                                     
 + Logical interface represented by a VLAN on a physical interface
 * SDP
]]></artwork>
        </figure>
        <t>Each VLAN
   represents a distinct logical interface on the ACs;
   hence it provides the possibility to place these logical interfaces
   in distinct Layer 2 or Layer 3 service instances and implement separation
   between slices via service instances. Since the 5G interfaces are IP-based
   interfaces (with an exception of the F2 fronthaul-interface, where eCPRI with Ethernet encapsulation is used), this
   VLAN is typically not transported across the provider network.  Typically,
   it has only local significance at a particular SDP.  For
   simplification, a deployment may rely on the same VLAN identifier
   for all ACs. However, that may not be always possible. As such, SDPs for a same slice at
   different locations may use different VLAN values.  Therefore, a
   VLAN to RFC 9543 Network Slice mapping table is maintained for each
   AC, and the VLAN allocation is coordinated between customer orchestration and
   provider orchestration.</t>
        <t>While VLAN hand-off is simple for NFs, it adds complexity at the provider network because of the requirement of maintaining
   mapping tables for each SDP and performing a configuration task for new VLANs and
   IP subnet for every slice on every AC.</t>
      </section>
      <section anchor="sec-ip-hof">
        <name>IP Hand-off</name>
        <t>In this option, an explicit mapping between source/destination IP addresses and
   slice's specific S-NSSAI is used. The mapping can have either local (e.g.,
   pertaining to single NF attachment) or global TN significance. The mapping can
   be realized in multiple ways, including (but not limited to):</t>
        <ul spacing="normal">
          <li>
            <t>S-NSSAI to a dedicated IP address for each NF</t>
          </li>
          <li>
            <t>S-NSSAI to a pool of IP addresses for global TN deployment</t>
          </li>
          <li>
            <t>S-NSSAI to a subset of bits of an IP address</t>
          </li>
          <li>
            <t>S-NSSAI to a DSCP value</t>
          </li>
          <li>
            <t>Use a deterministic algorithm to map S-NSAAI to an IP subnet, prefix, or pools. For example, adaptations to the algorithm defined in <xref target="RFC7422"/> may be considered.</t>
          </li>
        </ul>
        <t>Mapping S-NSSAIs to IP addresses makes IP addresses an identifier for slice-related
   policy enfocement in the Transport Network (e.g., Differentiated Services,
   traffic steering, bandwidth allocation, security policies, or monitoring).</t>
        <t>One example of the IP hand-off realization is the arrangement, where the slices in the TN
   domain are instantiated using IP tunnels (e.g., IPsec or GTP-U tunnels)
   established between NFs, as depicted in <xref target="_figure-ip-hand-off"/>. The transport for
   a single 5G slice might be constructed with multiple such tunnels, since a
   typical 5G slice contains many NFs - especially DUs and CUs. If a shared NF (i.e.,
   an NF that serves multiple slices, for example, a shared DU) is deployed, multiple
   tunnels from shared NF are established, each tunnel representing a single slice.</t>
        <figure anchor="_figure-ip-hand-off">
          <name>Example of 5G Slice with IP Hand-off Providing End-to-End Connectivity</name>
          <artwork align="center"><![CDATA[
                                        Tunnels representing slices                                                                     
                 +------------------+                   |        
                 |                  |                   |           
+------+       +--+--+ Provider +---+-+       +-----+   v   +------+
|    o============*================*==========================o    |
| NF   +-------+ PE  |          | PE  +-------+L2/L3+.......+   NF |
|    o============*================*==========================o    |
+------+  AC   +-+---+  Network +---+-+  AC   +-----+       +------+
                 |                  |                               
                 +------------------+
                                                                    
o Tunnel (IPsec, GTP-U, ...) termination point          
* SDP
]]></artwork>
        </figure>
        <t>As opposed to the VLAN hand-off case (<xref target="sec-vlan-handoff"/>), there is no logical interface representing
   a slice on the PE, hence all slices are handled within a single service instance.
   The IP and VLAN hand-offs are not mutually exclusive, but instead could be used
   concurrently. Since the TN doesn't recognize S-NSSAIs, a mapping table similar to
   the VLAN Hand-off solution is needed (<xref target="sec-vlan-handoff"/>).</t>
        <t>The mapping table can be simplified if, for example, IPv6 addressing is used to
   address NFs. An IPv6 address is a 128-bit long field, while the S-NSSAI is a
   32-bit field: Slice/Service Type (SST): 8 bits, Slice Differentiator (SD): 24
   bits. 32 bits, out of 128 bits of the IPv6 address, may be used to encode the
   S-NSSAI, which makes an IP to Slice mapping table unnecessary.</t>
        <t>The S-NSSAI/IPv6 mapping is a local IPv6 address allocation method to NFs not disclosed to on-path nodes. IP forwarding is not altered by this method and is
   still achieved following BCP 198 <xref target="RFC7608"/>. Concretely, intermediary TN nodes are not required to associate any additional semantic with IPv6 address.</t>
        <t>However, operators using such mapping methods should be aware of the implications
   of any change of S-NSSAI on the IPv6 addressing plans. For example, modifications of the S-NSSAIs in-use will require
   updating the IP addresses used by NFs involved in the associated slices.</t>
        <section anchor="an-example-of-local-ipv6-addressing-plan-for-network-functions">
          <name>An Example of Local IPv6 Addressing Plan for Network Functions</name>
          <t>Different IPv6 address allocation
   schemes following the above approach may be used, with one example allocation shown
   in <xref target="_figure-11"/>.</t>
          <figure anchor="_figure-11">
            <name>An Example of S-NSSAI Embedded into an IPv6 Address</name>
            <artwork align="center"><![CDATA[
             NF-specific          Reserved
        (not slice specific)     for S-NSSAI
   <----------------------------><--------->
   +----+----+----+----+----+----+----+----+
   |xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:ttdd:dddd|
   +----+----+----+----+----+----+----+----+
   <------------------128 bits------------->

    tt     - SST (8 bits)
    dddddd - SD (24 bits)
]]></artwork>
          </figure>
          <t>In reference to <xref target="_figure-11"/>, the most significant 96 bits of the IPv6 address
   are unique to the NF, but do not carry any slice-specific information. The S-NSSAI information is embedded in the least
   significant 32 bits. The 96-bit part of the address may be structured by the provider, for example, on the
   geographical location or the DC identification. Refer to <xref section="2.1." sectionFormat="of" target="RFC9099"/> for a discussion on the benefits of structuring an address plan around both services and geographic locations for more structured security policies in a network.</t>
          <t><xref target="_figure-s-nssai-deployment"/> uses the example from <xref target="_figure-11"/> to demonstrate a
   slicing deployment, where the entire S-NSSAI is embedded into IPv6 addresses used by
   NFs. Let us consider that "NF-A" has a set of tunnel termination points with unique per-slice IP addresses
   allocated from 2001:db8:a:0::/96, while "NF-B" uses a set of tunnel termination
   points with per-slice IP addresses allocated from 2001:db8:b:0::/96. This example shows
   two slices: "customer A eMBB" (SST-01, SD-00001) and "customer B Massive Internet of Things (MIoT)" (SST-03, SD-00003).
   For "customer A eMBB" slice, the tunnel IP addresses are auto-derived as the IP addresses {2001:db8:a::100:1, 2001:db8:b::100:1},
   where {:0100:0001} is used as the last two octets. "customer B MIoT" slice (SST-3,
   SD-00003) tunnel uses the IP addresses {2001:db8:a::300:3, 2001:db8:b::300:3} and simply
   adds {:0300:0003} as the last two octets. Leading zeros are not represented in the resulting IPv6 addresses as per <xref target="RFC5952"/>.</t>
          <figure anchor="_figure-s-nssai-deployment">
            <name>Deployment Example with S-NSSAI Embedded into IPv6 Addresses</name>
            <artwork align="center"><![CDATA[
 2001:db8:a::/96 (NF-A)                      2001:db8:b::/96 (NF-B) 
                                                                    
 2001:db8:a::100:1/128                2001:db8:b::100:1/128 
     |                                                        |     
     |            + - - - - - - - - +   eMBB (SST=1)          |     
     |            |                 |      |                  |     
+----v-+       +--+--+ Provider +---+-+    v  +-----+       +-v----+
|    o============*================*==========================o    |
| NF   +-------+ PE  |          | PE  +-------+L2/L3+.......+   NF |
|    o============*================*==========================o    |
+----^-+       +--+--+  Network +---+-+    ^  +-----+       +-^----+
     |            |                 |      |                  |     
     |            + - - - - - - - - + MIoT (SST=3)            |     
     |                                                        |     
 2001:db8:a::300:3/128               2001:db8:b::300:3/128 
                                                                   
 o Tunnel (IPsec, GTP-U, etc) termination point          
 * SDP
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="sec-mpls-ho">
        <name>MPLS Label Hand-off</name>
        <t>In this option, the service instances representing different slices
   are created directly on the NF, or within the customer site
   hosting the NF, and attached to the provider network.  Therefore, the packet
   is encapsulated outside the provider network with MPLS
   encapsulation or MPLS-in-UDP encapsulation <xref target="RFC7510"/>, depending on the capability
   of the customer site, with the service label depicting
   the slice.</t>
        <t>There are three major methods (based upon <xref section="10" sectionFormat="of" target="RFC4364"/>) for interconnecting MPLS services over multiple service domains:</t>
        <dl>
          <dt>Option A (<xref target="sec-10a"/>):</dt>
          <dd>
            <t>VRF-to-VRF connections.</t>
          </dd>
          <dt>Option B (<xref target="sec-10b"/>):</dt>
          <dd>
            <t>redistribution of labeled VPN routes with next-hop
change at domain boundaries.</t>
          </dd>
          <dt>Option C (<xref target="sec-10c"/>):</dt>
          <dd>
            <t>redistribution of labeled VPN routes without next-hop
    change and redistribution of labeled transport routes with next-hop
    change at domain boundaries.</t>
          </dd>
        </dl>
        <t><xref target="_figure-51"/> illustrates the use of service-aware CE (<xref target="sec-ce"/>) for the deployment discussed in Sections <xref format="counter" target="sec-10b"/> and <xref format="counter" target="sec-10c"/>.</t>
        <figure anchor="_figure-51">
          <name>Example of MPLS-based Attachment Circuit</name>
          <artwork align="center"><![CDATA[
+--------------+                      +--------------+
|   Customer   |                      |   Provider   |
|     Site     |                      |    Network   |
|              |                      |              |
|              |                      |              |
|              |  <------MP-BGP-----> |              |
|           +--+-+                  +-+--+           |
|           |    |   MPLS-based AC  |    |           |
|           | CE +------------------+ PE |           |
|        +--+----+--+               |    |           |
|        | VRF foo  |               +-+--+           |
+--------+----------+                 +--------------+
]]></artwork>
        </figure>
        <section anchor="sec-10a">
          <name>Option A</name>
          <t>This option is not based on MPLS label hand-off, but VLAN hand-off, described in <xref target="sec-vlan-handoff"/>.</t>
        </section>
        <section anchor="sec-10b">
          <name>Option B</name>
          <t>In this option, L3VPN service instances are instantiated outside the
   provider network.  These L3VPN service instances
   are instantiated in the customer site which could be, for example, either on the compute that hosts mobile NFs (<xref target="_figure-mpls-10b-hand-off"/>, left hand side) or within the DC/cloud
   infrastructure itself (e.g., on the top of the rack or leaf switch
   within cloud IP fabric (<xref target="_figure-mpls-10b-hand-off"/>, right hand side)). On the
   AC connected to a PE, packets are already MPLS
   encapsulated (or MPLS-in-UDP/MPLS-in-IP encapsulated, if cloud or compute
   infrastructure don't support MPLS encapsulation). Therefore,
   the PE uses neither a VLAN nor an IP address for slice
   identification at the SDP, but instead uses the MPLS label.</t>
          <figure anchor="_figure-mpls-10b-hand-off">
            <name>Example of MPLS Hand-off with Option B</name>
            <artwork align="center"><![CDATA[
     <------        <------        <------                          
     BGP VPN        BGP VPN        BGP VPN                          
       COM=1, L=A"    COM=1, L=A'    COM=1, L=A                     
       COM=2, L=B"    COM=2, L=B'    COM=2, L=B                     
       COM=3, L=C"    COM=3, L=C'    COM=3, L=C                     
     <-------------><------------><------------->                    
               nhs  nhs      nhs  nhs                               
                                                        VLANs       
service instances                service instances  representing   
representing slices              representing slices    slices      
      |                                       |         | 
+---+ |           +--------------+           +|---------|----------+
|   | |           |     Provider |           ||         |          |
|+--+-v-+       +-+---+       +--+--+      +-+v----+    v  +------+|
||    # |       |*    |       |    *|      |  #<><>x.......x      ||
|| NF # +-------+* PE |       | PE *+------+  #<><>x.......x   NF ||
||    # |   AC  |*    |       |    *|   AC |  #<><>x.......x      ||
|+---+--+       +-+---+       +---+-+      +-+-----+       +------+|
| CS1|            |      Network  |          | L2/L3    CS2        |
+----+            +---------------+          +---------------------+

  x Logical interface represented by a VLAN on a physical interface   
  # Service instances (with unique MPLS labels)                    
  * SDP
]]></artwork>
          </figure>
          <t>MPLS labels are allocated dynamically in Option B
   deployments, where at the domain boundaries service prefixes are
   reflected with next-hop self, and a new label is dynamically allocated,
   as visible in <xref target="_figure-mpls-10b-hand-off"/> (e.g., labels A, A', and A" for the first depicted slice).  Therefore, for any slice-specific per-hop
   behavior at the provider network edge, the PE needs to determine
   which label represents which slice.  In the BGP control plane, when
   exchanging service prefixes over an AC, each slice might be represented by a unique BGP community, so
   tracking label assignment to the slice might be possible.  For example, in
   <xref target="_figure-mpls-10b-hand-off"/>, for the slice identified with COM-1, the PE advertises a
   dynamically allocated label A". Since, based on the community, the
   label to slice association is known, the PE can use this dynamically
   allocated label A" to identify incoming packets as belonging to "slice 1"
   and execute appropriate edge per-hop behavior.</t>
          <t>It is worth noting that slice identification in the BGP control plane
   might be with per-prefix granularity.  In the extreme case, each prefix can have
   different community representing a different slice.  Depending on the
   business requirements, each slice could be represented by a different
   service instance as outlined in <xref target="_figure-mpls-10b-hand-off"/>.  In that case, the route
   target extended community (<xref section="4" sectionFormat="of" target="RFC4360"/>) might be used as slice differentiator.  In
   other deployments, all prefixes (representing different slices)
   might be handled by a single 'mobile' service instance, and some other
   BGP attribute (e.g., a standard community <xref target="RFC1997"/>) might be used for slice
   differentiation.  There could be also a deployment option that groups multiple
   slices together into a single service instance, resulting in a
   handful of service instances.  In any case, fine-grained per-hop
   behavior at the edge of provider network is possible.</t>
        </section>
        <section anchor="sec-10c">
          <name>Option C</name>
          <t>Option B relies upon exchanging service prefixes between customer sites
and the provider network. This may lead to scaling challenges in large
scale 5G deployments as the PE node needs to carry all service prefixes.
To alleviate this scaling challenge, in Option C, service prefixes are
exchanged between customer sites only. In doing so, the provider network is offloaded from
carrying, propagating, and programing appropriate forwarding entries
for service prefixes.</t>
          <t>Option C relies upon exchanging service prefixes via multi-hop BGP sessions
between customer sites, without changing the NEXT_HOP BGP attribute.
Additionally, IPv4/IPv6 labeled unicast (SAFI-4) host routes, used as NEXT_HOP
for service prefixes, are exchanged via direct single-hop BGP sessions between
adjacent nodes in a customer site and a provider network, as depicted in <xref target="_figure-mpls-10c-hand-off"/>.
As a result, a node in a customer site performs hierarchical next-hop resolution.</t>
          <figure anchor="_figure-mpls-10c-hand-off">
            <name>MPLS Hand-off with Option C</name>
            <artwork align="center"><![CDATA[
     <-------------------------------------------
             BGP VPN
               COM=1, L=A, NEXT_HOP=CS2
               COM=2, L=B, NEXT_HOP=CS2
               COM=3, L=C, NEXT_HOP=CS2
     <------------------------------------------>

      <------        <------        <------
      BGP LU         BGP LU         BGP LU
        CS2, L=X"      CS2, L=X'      CS2, L=X
     <-------------><------------><------------->
                nhs  nhs      nhs  nhs
                                                        VLANs
service instances                service instances  representing
representing slices              representing slices    slices
      |                                       |         |
+---+ |           +--------------+           +|---------|----------+
|   | |           |     Provider |           ||         |          |
|+--+-v-+       +-+---+       +--+--+      +-+v----+    v  +------+|
||    # |       |*    |       |    *|      |  #<><>x.......x      ||
|| NF # +-------+* PE |       | PE *+------+  #<><>x.......x   NF ||
||    # |   AC  |*    |       |    *|   AC |  #<><>x.......x      ||
|+---+--+       +-+---+       +---+-+      +-+-----+       +------+|
| CS1|            |      Network  |          | L2/L3    CS2        |
+----+            +---------------+          +---------------------+

   x Logical interface represented by a VLAN on s physical interface
   # Service instances (with unique MPLS label)
   * SDP
]]></artwork>
          </figure>
          <t>This architecture requires an end-to-end Label Switched Path (LSP) leading from a packet's
ingress node inside one customer site to its egress inside another customer
site, through a provider network. Hence, at the domain (customer site, provider network)
boundaries NEXT_HOP attribute for IPv4/IPv6 labeled unicast needs to be modified to "next-hop self" (nhs),
which results in new IPv4/IPv6 labeled unicast label allocation. Appropriate label swap
forwarding entries for IPv4/IPv6 labeled unicast labels are programmed in the data plane.
On the AC there is no additional 'labeled transport' protocol (i.e., no LDP, RSVP, SR, ...).</t>
          <t>Packets are transmitted over the AC with the IPv4/IPv6 labeled
unicast as the top label, with service label deeper in the label stack. In Option C,
the service label is not used for forwarding lookup on the PE. This significantly
lowers the scaling pressure on PEs, as PEs need to program forwarding entries only for
IPv4/IPv6 labeled unicast host routes, used as NEXT_HOP for service prefixes. Also,
since one IPv4/IPv6 labeled unicast host route represent one customer site, regardless
of the number of slices in the customer site, the number of forwarding entries
on a PE is considerably reduced.</t>
          <t>For any slice-specific per-hop behavior at the provider network edge, as described
in details in <xref target="sec-over-rea-model"/>, the PE need to determine which label in the packet
represents which slice. This can be achieved, for example, by allocating non-overlapping service label
ranges for each slice, and use these ranges for slice identification purposes on PE.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-qos-map">
      <name>QoS Mapping Realization Models</name>
      <section anchor="sec-qos-layers">
        <name>QoS Layers</name>
        <t>The resources are managed via various QoS policies deployed in the
   network.  QoS mapping models to support 5G slicing connectivity
   implemented over packet switched provider network uses two layers of QoS that are discussed in <xref target="sec-qos-layers"/>.</t>
        <section anchor="g-qos-layer">
          <name>5G QoS Layer</name>
          <t>QoS treatment is indicated in the 5G QoS layer by the 5G QoS
   Indicator (5QI), as defined in <xref target="TS-23.501"/>. A 5QI is an identifier that is
   used as a reference to 5G QoS characteristics (e.g., scheduling
   weights, admission thresholds, queue management thresholds, and link
   layer protocol configuration) in the RAN domain.  Given that
   5QI applies to the RAN domain, it is not visible to the
   provider network.  Therefore, if 5QI-aware treatment is desired in the provider
   network as well, 5G network functions might set DSCP with a value
   representing 5QI so that differentiated treatment can implemented in the provider network
   as well.  Based on these DSCP values, at SDP of each provider network segment
   used to construct transport for given 5G slice, very granular QoS
   enforcement might be implemented.</t>
          <t>The exact mapping between 5QI and
   DSCP is out of scope for this document.  Mapping recommendations
   are documented, e.g., in <xref target="I-D.cbs-teas-5qi-to-dscp-mapping"/>.</t>
          <t>Each slice service might have flows with multiple 5QIs. 5QIs (or, more precisely,
   corresponding DSCP values) are visible to the provider network at SDPs
   (i.e., at the edge of the provider network).</t>
          <t>In this document, this layer of QoS is referred to as '5G QoS
   Class' ('5G QoS' in short) or '5G DSCP'.</t>
        </section>
        <section anchor="tn-qos-layer">
          <name>TN QoS Layer</name>
          <t>Control of the TN resources on provider network transit links, as well as traffic
   scheduling/prioritization on provider network transit links, is based on a flat
   (non-hierarchical) QoS model in this Network Slice
   realization.  That is, RFC 9543 Network Slices are assigned dedicated
   resources (e.g., QoS queues) at the edge of the provider network (at
   SDPs), while all RFC 9543 Network Slices are sharing resources (sharing
   QoS queues) on the transit links of the provider network.  Typical router
   hardware can support up to 8 traffic queues per port, therefore
   the document assumes 8 traffic queues per port support in
   general.</t>
          <t>At this layer, QoS treatment is indicated by a QoS indicator
   specific to the encapsulation used in the provider network. Such an indicator may
   be DSCP or MPLS Traffic Class (TC). This layer of QoS is referred to as 'TN QoS
   Class', or 'TN QoS' for short, in this document.</t>
        </section>
      </section>
      <section anchor="qos-realization-models">
        <name>QoS Realization Models</name>
        <t>While 5QI might be exposed to the provider network via the DSCP value
   (corresponding to specific 5QI value) set in the IP packet generated
   by NFs, some 5G deployments might use 5QI in the RAN domain only,
   without requesting per-5QI differentiated treatment from the provider network.
   This might be due to an NF limitation (e.g., no capability to set
   DSCP), or it might simply depend on the overall slicing deployment
   model.  The O-RAN Alliance, for example, defines a phased approach to
   the slicing, with initial phases utilizing only per-slice, but not
   per-5QI, differentiated treatment in the TN domain
   (Annex F of <xref target="O-RAN.WG9.XPSAAS"/>).</t>
        <t>Therefore, from a QoS perspective, the 5G slicing connectivity
   realization defines two high-level realization models
   for slicing in the TN domain: a 5QI-unaware model and a 5QI-
   aware model.  Both slicing models in the TN domain could be
   used concurrently within the same 5G slice.  For example, the TN
   segment for 5G midhaul (F1-U interface) might be 5QI-aware, while
   at the same time the TN segment for 5G backhaul (N3 interface) might
   follow the 5QI-unaware model.</t>
        <t>These models are further elaborated in the following two subsections.</t>
        <section anchor="sec-5QI-unaware">
          <name>5QI-unaware Model</name>
          <t>In 5QI-unaware mode, the DSCP values in the packets received from NF
   at SDP are ignored.  In the provider network, there is no QoS
   differentiation at the 5G QoS Class level.  The entire RFC 9543 Network
   Slice is mapped to a single TN QoS Class, and, therefore, to a single
   QoS queue on the routers in the provider network.  With a small number of
   deployed 5G slices (for example, only two 5G slices: eMBB and MIoT),
   it is possible to dedicate a separate QoS queue for each slice on
   transit routers in the provider network.  However, with the introduction of private/enterprises
   slices, as the number of 5G slices (and thus corresponding RFC 9543
   Network Slices) increases, a single QoS queue on transit links in the provider network serves
   multiple slices with similar characteristics.  QoS enforcement on
   transit links is fully coarse-grained (single NRP, sharing resources among
   all RFC 9543 Network Slices), as displayed in <xref target="_figure-QoS-5QI-unaware"/>.</t>
          <figure anchor="_figure-QoS-5QI-unaware">
            <name>Slice to TN QoS Mapping (5QI-unaware Model)</name>
            <artwork align="center"><![CDATA[
+------------------------------------------------------------+
+-----------------+         PE                               |
|+ - - - - - - - +|                                          | 
||  SDP          ||              +---------------------------+
||  +----------+ ||              |       Transit link        |
||  |     NS 1 +------------+    |+------------------------+ |
||  +----------+ ||         |----->     TN QoS Class 1     | |
|+ - - - - - - - +|         |    |+------------------------+ |
|+ - - - - - - - +|         |    |+------------------------+ |
||  SDP          ||         |    ||     TN QoS Class 2     | |
||  +----------+ ||         |    |+------------------------+ |
|   |     NS 2 +--------+   |    |+------------------------+ |
||  +----------+ ||     |   |    ||     TN QoS Class 3     | |
|+ - - - - - - - +|     |   |    |+------------------------+ |
|+ - - - - - - - +|     |   |    |+------------------------+ |
||  SDP          ||     +--------->     TN QoS Class 4     | |
||  +----------+ ||         |    |+------------------------+ |
||  |     NS 3 +------------+    |+------------------------+ |
||  +----------+ ||     +--------->     TN QoS Class 5     | |
|+ - - - - - - - +|     |        |+------------------------+ |
|+ - - - - - - - +|     |        |+------------------------+ |
||  SDP          ||     |        ||     TN QoS Class 6     | |
||  +----------+ ||     |        |+------------------------+ |
||  |     NS 4 +--------+        |+------------------------+ |
||  +----------+ ||     |        ||     TN QoS Class 7     | |
|+ - - - - - - - +|     |        |+------------------------+ |
|+ - - - - - - - +|     |        |+------------------------+ |
||  SDP          ||     |        ||     TN QoS Class 8     | |
||  +----------+ ||     |        |+------------------------+ |
||  |     NS 5 +--------+        |     Max 8 TN Classes      |
||  +----------+ ||              +---------------------------+
|+ - - - - - - - +|                                          |
+-----------------+                                          |
+------------------------------------------------------------+
Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
  (dedicated resources per     (resources shared by multiple  
   RFC 9543 Network Slice)       RFC 9543 Network Slices)            
]]></artwork>
          </figure>
          <t>When the IP traffic is handed over at the SDP from the AC to the provider network, the PE encapsulates the
   traffic into MPLS (if MPLS transport is used in the provider network), or
   IPv6 - optionally with some additional headers (if SRv6 transport is
   used in the provider network), and sends out the packets on the provider network transit
   link.</t>
          <t>The original IP header retains the DCSP marking (which is ignored in
   5QI-unaware model), while the new header (MPLS or IPv6) carries QoS
   marking (MPLS Traffic Class bits for MPLS encapsulation, or DSCP for
   SRv6/IPv6 encapsulation) related to TN Class of Service (CoS).  Based on TN CoS
   marking, per-hop behavior for all RFC 9543 Network Slices is executed on
   provider network transit links.  Provider network transit routers do not evaluate the original IP
   header for QoS-related decisions.  This model is outlined in
   <xref target="_figure-15"/> for MPLS encapsulation, and in <xref target="_figure-16"/> for SRv6
   encapsulation.</t>
          <figure anchor="_figure-15">
            <name>QoS with MPLS Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 +--------------+
                                 | MPLS Header  |
                                 +-----+-----+  |
                                 |Label|TN TC|  |
+--------------+ - - - - - - - - +-----+-----+--+
|  IP Header   |         |\      |  IP Header   |
|      +-------+         | \     |      +-------+
|      |5G DSCP|---------+  \    |      |5G DSCP|
+------+-------+             \   +------+-------+
|              |              \  |              |
|              |               \ |              |
|              |                 |              |
|   Payload    |               / |   Payload    |
|(GTP-U/IPsec) |              /  |(GTP-U/IPsec) |
|              |             /   |              |
|              |---------+  /    |              |
|              |         | /     |              |
|              |         |/      |              |
+--------------+ - - - - - - - - +--------------+
]]></artwork>
          </figure>
          <figure anchor="_figure-16">
            <name>QoS with IPv6 Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 +--------------+
                                 | IPv6 Header  |
                                 |      +-------+
                                 |      |TN DSCP|
                                 +------+-------+
                                 :   Optional   :
                                 :     IPv6     :
                                 :    Headers   :
+--------------+ - - - - - - - - +-----+-----+--+
|  IP Header   |         |\      |  IP Header   |
|      +-------+         | \     |      +-------+
|      |5G DSCP|---------+  \    |      |5G DSCP|
+------+-------+             \   +------+-------+
|              |              \  |              |
|              |               \ |              |
|              |                 |              |
|   Payload    |               / |   Payload    |
|(GTP-U/IPsec) |              /  |(GTP-U/IPsec) |
|              |             /   |              |
|              |---------+  /    |              |
|              |         | /     |              |
|              |         |/      |              |
+--------------+ - - - - - - - - +--------------+
]]></artwork>
          </figure>
          <t>From a QoS perspective, both options are similar.  However, there
   is one difference between the two options.  The MPLS TC is only 3
   bits (8 possible combinations), while DSCP is 6 bits (64 possible
   combinations).  Hence, SRv6 provides more flexibility for TN CoS
   design, especially in combination with soft policing with in-profile/
   out-profile traffic, as discussed in <xref target="sec-inbound-edge-resource-control"/>.</t>
          <t>Provider network edge resources are controlled in a granular, fine-grained
   manner, with dedicated resource allocation for each RFC 9543 Network
   Slice.  The resource control/enforcement happens at each SDP in two
   directions: inbound and outbound.</t>
          <section anchor="sec-inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>The main aspect of inbound provider network edge resource control is per-slice traffic
   volume enforcement.  This kind of enforcement is often called
   'admission control' or 'traffic conditioning'.  The goal of this
   inbound enforcement is to ensure that the traffic above the
   contracted rate is dropped or deprioritized, depending on the
   business rules, right at the edge of provider network.  This, combined with
   appropriate network capacity planning/management (<xref target="sec-capacity-planning"/>) is required to ensure proper isolation between slices in
   a scalable manner.  As a result, traffic of one slice has no influence
   on the traffic of other slices, even if the slice is misbehaving
   (e.g., Distributed Denial-of-Service (DDoS) attacks or node/link failures) and generates traffic
   volumes above the contracted rates.</t>
            <t>The slice rates can be characterized with following parameters
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>:</t>
            <ul spacing="normal">
              <li>
                <t>CIR: Committed Information Rate (i.e., guaranteed bandwidth)</t>
              </li>
              <li>
                <t>PIR: Peak Information Rate (i.e., maximum bandwidth)</t>
              </li>
            </ul>
            <t>These parameters define the traffic characteristics of the slice and
   are part of SLO parameter set provided by the 5G NSO to an NSC.  Based
   on these parameters, the provider network's inbound policy can be implemented using one
   of following options:</t>
            <ul spacing="normal">
              <li>
                <t>1r2c (single-rate two-color) rate limiter  </t>
                <t>
This is the most basic rate limiter, described in <xref section="2.3" sectionFormat="of" target="RFC2475"/>.
It meters at the SDP a
traffic stream of given slice and marks its packets as in-profile
(below CIR being enforced) or out-of-profile (above CIR being enforced).
In-profile packets are accepted and forwarded.  Out-of profile
packets are either dropped right at the SDP (hard rate limiting),
or remarked (with different MPLS TC or DSCP TN markings) to
signify 'this packet should be dropped in the first place, if
there is a congestion' (soft rate limiting), depending on the
business policy of the provider network.  In the second case, while
packets above CIR are forwarded at the SDP, they are subject to being
dropped during any congestion event at any place in the provider network.</t>
              </li>
              <li>
                <t>2r3c (two-rate three-color) rate limiter  </t>
                <t>
This was initially defined in <xref target="RFC2698"/>, and its improved version
in <xref target="RFC4115"/>.  In essence, the traffic is assigned to one of the these three
categories:  </t>
                <ul spacing="normal">
                  <li>
                    <t>Green, for traffic under CIR</t>
                  </li>
                  <li>
                    <t>Yellow, for traffic between CIR and PIR</t>
                  </li>
                  <li>
                    <t>Red, for traffic above PIR</t>
                  </li>
                </ul>
                <t>
An inbound 2r3c meter implemented with <xref target="RFC4115"/>, compared to
<xref target="RFC2698"/>, is more 'customer friendly' as it doesn't impose
outbound peak-rate shaping requirements on customer edge (CE)
devices. 2r3c meters in general give greater flexibility for provider network edge
enforcement regarding accepting the traffic (green), de-
prioritizing and potentially dropping the traffic on transit during
congestion (yellow), or hard dropping the traffic (red).</t>
              </li>
            </ul>
            <t>Inbound provider network edge enforcement model for 5QI-unaware model, where all packets
   belonging to the slice are treated the same way in the provider network (no
   5Q QoS Class differentiation in the provider) is outlined in
   <xref target="_figure-17"/>.</t>
            <figure anchor="_figure-17">
              <name>Ingress Slice Admission Control (5QI-unware Model)</name>
              <artwork align="center"><![CDATA[
            Slice
           policer     +---------+
              |    +---|--+      |
              |    |      |      |
              |    |    S |      |
              |    |    l |      |
              v    |    i |      |
-------------<>----|--> c |      |
                   |    e |  A   |
                   |      |  t   |
                   |    1 |  t   |
                   |      |  a   |
                    ------   c   |
                   |      |  h   |
                   |    S |  m   |
                   |    l |  e   |
                   |    i |  n   |
-------------<>----|--> c |  t   |
                   |    e |      |
                   |      |  C   |
                   |    2 |  i   |
                   |      |  r   |
                    ------   c   |
                   |      |  u   |
                   |    S |  i   |
                   |    l |  t   |
                   |    i |      |
-------------<>----|--> c |      |
                   |    e |      |
                   |      |      |
                   |    3 |      |
                   |      |      |
                   +---|--+      |
                       +---------+
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control">
            <name>Outbound Edge Resource Control</name>
            <t>While inbound slice admission control at the provider network edge is
   mandatory in the architecture described in this document, outbound provider network edge resource control might not be
   required in all use cases.  Use cases that specifically call for
   outbound provider network edge resource control are:</t>
            <ul spacing="normal">
              <li>
                <t>Slices use both CIR and PIR parameters, and provider network edge links
(ACs) are dimensioned to fulfil the aggregate of
slice CIRs.  If at any given time, some slices send the traffic
above CIR, congestion in outbound direction on the provider network edge
link (AC) might happen.  Therefore, fine-grained resource control to
guarantee at least CIR for each slice is required.</t>
              </li>
              <li>
                <t>Any-to-Any (A2A) connectivity constructs are deployed, again
resulting in potential congestion in outbound direction on the
provider network edge links, even if only slice CIR parameters are used.
This again requires fine-grained resource control per slice in
outbound direction at the provider network edge links.</t>
              </li>
            </ul>
            <t>As opposed to inbound provider network edge resource control, typically implemented
   with rate-limiters/policers, outbound resource control is typically
   implemented with a weighted/priority queuing, potentially combined
   with optional shapers (per slice).  A detailed analysis of different
   queuing mechanisms is out of scope for this document, but is provided
   in <xref target="RFC7806"/>.</t>
            <t><xref target="_figure-18"/> outlines the outbound provider network edge resource control model
   for 5QI-unaware slices.  Each slice is
   assigned a single egress queue.  The sum of slice CIRs, used as the
   weight in weighted queueing model, should not exceed the physical
   capacity of the AC.  Slice requests above this limit
   should be rejected by the NSC, unless an already established slice with
   lower priority, if such exists, is preempted.</t>
            <figure anchor="_figure-18">
              <name>Ingress Slice Admission control (5QI-unaware Model)</name>
              <artwork align="center"><![CDATA[
      +---------+        QoS output queues
      |     +---|--+- - - - - - - - - - - - - - - - - - - - - - - - - -
      |     | S    |                            \|/
      |     | l    |                             |
      |     | i    |                             |
      |  A  | c    |                             |  weight-Slice-1-CIR
      |  t  | e  +-|--------------------------+  | shaping-Slice-1-PIR
   ---|--t--|---->                            |  |
      |  a  | 1  +-|--------------------------+ /|\
      |  c   ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
      |  h  | S    |                            \|/
      |  m  | l    |                             |
      |  e  | i    |                             |
      |  n  | c    |                             |  weight-Slice-2-CIR
      |  t  | e  +-|--------------------------+  | shaping-Slice-2-PIR
   ---|-----|---->                            |  |
      |  C  | 2  +-|--------------------------+ /|\
      |  i   ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
      |  r  | S    |                            \|/
      |  c  | l    |                             |
      |  u  | i    |                             |
      |  i  | c    |                             |  weight-Slice-3-CIR
      |  t  | e  +-|--------------------------+  | shaping-Slice-3-PIR
   ---|-----|---->                            |  |
      |     | 3  +-|--------------------------+ /|\
      |     +---|--+- - - - - - - - - - - - - - - - - - - - - - - - - -
      +---------+
]]></artwork>
            </figure>
          </section>
        </section>
        <section anchor="qi-aware-model">
          <name>5QI-aware Model</name>
          <t>In the 5QI-aware model, potentially a large number of 5G QoS Classes, represented via the DSCP set by NFs
   (the architecture scales to thousands of 5G slices) is mapped
   (multiplexed) to up to 8 TN QoS Classes used in a provider network transit
   equipment, as outlined in <xref target="_figure-QoS-5QI-aware"/>.</t>
          <figure anchor="_figure-QoS-5QI-aware">
            <name>Slice 5Q QoS to TN QoS Mapping (5QI-aware Model)</name>
            <artwork align="center"><![CDATA[
  +------------------------------------------------------------+ 
  +-----------------+        PE                                |
  |+ - - - - - - - +|                                          |    
R ||  SDP          ||              +---------------------------+
F ||  +----------+ ||              |       Transit link        |
C ||  |5G DSCP A +---------------+ |+------------------------+ |
9 ||  +----------+ ||            +-->     TN QoS Class 1     | |
5 ||  +----------+ ||            | |+------------------------+ |
4 ||  |5G DSCP B +-----------+   | |+------------------------+ |
3 ||  +----------+ ||        |   | ||     TN QoS Class 2     | |
  ||  +----------+ ||        |   | |+------------------------+ |
N ||  |5G DSCP C +--------+  |   | |+------------------------+ |
S ||  +----------+ ||     |  |   | ||     TN QoS Class 3     | |
  ||  +----------+  |     |  |   | |+------------------------+ |
1 ||  |5G DSCP D +-----+  |  |   | |+------------------------+ |
  ||  +----------+  |  |  |  +------>     TN QoS Class 4     | |
  |+ - - - - - - - +|  |  |  |   | |+------------------------+ |
R |+ - - - - - - - +|  |  |  |   | |+------------------------+ |
F ||  +----------+  |  |  +--------->     TN QoS Class 5     | |
C ||  |5G DSCP A +-----|--|--|---+ |+------------------------+ |
9 ||  +----------+ ||  |  |  |     |+------------------------+ |
5 ||  +----------+ ||  |  |  |     ||     TN QoS Class 6     | |
4 ||  |5G DSCP E +-----|--|--+     |+------------------------+ |
3 ||  +----------+ ||  |  |        |+------------------------+ |
  ||  +----------+ ||  |  |        ||     TN QoS Class 7     | |
N ||  |5G DSCP F +-----|--+        |+------------------------+ |
S ||  +----------+ ||  |           |+------------------------+ |
  ||  +----------+ ||  +------------>     TN QoS Class 8     | |
2 ||  |5G DSCP G +-----+           |+------------------------+ |
  ||  +----------+ ||              |     Max 8 TN Classes      |
  ||  SDP          ||              +---------------------------+
  |+ - - - - - - - +|                                          |
  +-----------------+                                          |                                         
  +------------------------------------------------------------+ 
  Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
    (dedicated resources per     (resources shared by multiple  
     RFC 9543 Network Slice)        RFC 9543 Network Slices)            
]]></artwork>
          </figure>
          <t>Given that in deployments with a large number of 5G
   slices, the number of potential 5G QoS Classes is much higher than
   the number of TN QoS Classes, multiple 5G QoS Classes with similar
   characteristics - potentially from different slices -
   would be grouped with common operator-defined TN logic and mapped to a same TN QoS Class when transported in the
   provider network.  That is, common Per-hop Behavior (PHB) <xref target="RFC2474"/> is executed on
   transit provider network routers for all packets grouped together. An example of this
   approach is outlined in <xref target="_figure-QoS-5QI-mapping-example"/>. A provider may decide
   to implement Diffserv-Intercon PHBs at the boundaries of its network domain <xref target="RFC8100"/>.</t>
          <dl>
            <dt>Note:</dt>
            <dd>
              <t>The numbers indicated in <xref target="_figure-QoS-5QI-mapping-example"/> (S-NSSAI, 5QI, DSCP, queue, etc.) are provided for illustration purposes only and should not be considered as deployment guidance.</t>
            </dd>
          </dl>
          <figure anchor="_figure-QoS-5QI-mapping-example">
            <name>Example of 3GPP QoS Mapped to TN QoS</name>
            <artwork align="center"><![CDATA[
                      +-------------  PE  -----------------+
+------ NF-A ------+  |                                    |
|                  |  | + - - - - +                        |
| 3GPP S-NSSAI 100 |  | |   SDP   |                        |
|.------. .-------.|  | |.-------.|                        |
||5QI=1 +->DSCP=46+------>DSCP=46+---+                     |
|'------' '-------'|  | |'-------'|  |                     |
|.------. .-------.|  | |.-------.|  |                     |
||5QI=65+->DSCP=46+------>DSCP=46+|--+                     |
|'------' '-------'|  | |'-------'|  |                     |
|.------. .-------.|  | |.-------.|  |                     |
||5QI=7 +->DSCP=10+------>DSCP=10------+  .--------------. |
|'------' '-------'|  | |'-------'|  | |  |TN QoS Class 5| |
+------------------+  | +- - - - -+  +-|-->   Queue 5    | |
                      |              | |  '--------------' |
+------ NF-B ------+  |              | |                   |
|                  |  | + - - - - +  | |                   |
| 3GPP S-NSSAI 200 |  | |   SDP   |  | |                   |
|.------. .-------.|  | |.-------.|  | |                   |
||5QI=1 +->DSCP=46+------>DSCP=46+---+ |  .--------------. |
|'------' '-------'|  | |'-------'|  | |  |TN QoS Class 1| |
|.------. .-------.|  | |.-------.|  | +-->   Queue 1    | |
||5QI=65+->DSCP=46+------>DSCP=46+|--+ |  '--------------' |
|'------' '-------'|  | |'-------'|    |                   |
|.------. .-------.|  | |.-------.|    |                   |
||5QI=7 +->DSCP=10+------>DSCP=10+-----+                   |
|'------' '-------'|  | |'-------'|                        |
+------------------+  | +- - - - -+                        |
                      +------------------------------------+
]]></artwork>
          </figure>
          <t>In current SDO progress of 3GPP (Release 17) and O-RAN, the mapping of 5QI to
DSCP is not expected to be in a per-slice fashion, where 5QI to DSCP mapping may
vary from 3GPP slice to 3GPP slice, hence the mapping of 5G QoS DSCP values
to TN QoS Classes may be rather common.</t>
          <t>Like in the 5QI-unaware model, the original IP header retains the DCSP
   marking corresponding to 5QI (5G QoS Class), while the new header
   (MPLS or IPv6) carries QoS marking related to TN QoS Class.  Based on
   TN QoS Class marking, per-hop behavior for all aggregated 5G QoS
   Classes from all RFC 9543 Network Slices is executed on the provider network transit links.  Provider network
   transit routers do not evaluate the original IP header for QoS
   related decisions.  The original DSCP marking retained in the
   original IP header is used at the PE for fine-grained per slice and
   per 5G QoS Class inbound/outbound enforcement on the AC.</t>
          <t>In the 5QI-aware model, compared to the 5QI-unware model, provider network edge resources are controlled in an even more
   granular, fine-grained manner, with dedicated resource allocation for
   each RFC 9543 Network Slice and dedicated resource allocation for number
   of traffic classes (most commonly up 4 or 8 traffic classes,
   depending on the Hardware capability of the equipment) within each RFC 9543
   Network Slice.</t>
          <section anchor="inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>Compared to the 5QI-unware model, admission control (traffic
   conditioning) in the 5QI-aware model is more granular, as it enforces
   not only per slice capacity constraints, but may as well enforce the
   constraints per 5G QoS Class within each slice.</t>
            <t>A 5G slice using multiple 5QIs can potentially specify rates in one of
   the following ways:</t>
            <ul spacing="normal">
              <li>
                <t>Rates per traffic class (CIR or CIR+PIR), no rate per slice (sum
of rates per class gives the rate per slice).</t>
              </li>
              <li>
                <t>Rate per slice (CIR or CIR+PIR), and rates per prioritized
(premium) traffic classes (CIR only).  Best effort traffic class
uses the bandwidth (within slice CIR/PIR) not consumed by
prioritized classes.</t>
              </li>
            </ul>
            <t>In the first option, the slice admission control is executed with
   traffic class granularity, as outlined in <xref target="_figure-20"/>.  In this model,
   if a premium class doesn't consume all available class capacity, it
   cannot be reused by non-premium (i.e., Best Effort) class.</t>
            <figure anchor="_figure-20">
              <name>Ingress Slice Admission Control (5QI-aware Model)</name>
              <artwork align="center"><![CDATA[
                     Class             +---------+
                    policer         +--|---+     |
                                    |      |     |
5Q-QoS-A: CIR-1A ------<>-----------|--> S |     |
5Q-QoS-B: CIR-1B ------<>-----------|--> l |     |
5Q-QoS-C: CIR-1C ------<>-----------|--> i |     |
                                    |    c |     |
                                    |    e |     |
   BE CIR/PIR-1D ------<>-----------|-->   |  A  |
                                    |    1 |  t  |
                                    |      |  t  |
                                     ------   a  |
                                    |      |  c  |
5Q-QoS-A: CIR-2A ------<>-----------|->  S |  h  |
5Q-QoS-B: CIR-2B ------<>-----------|->  l |  m  |
5Q-QoS-C: CIR-2C ------<>-----------|->  i |  e  |
                                    |    c |  n  |
                                    |    e |  t  |
   BE CIR/PIR-2D ------<>-----------|->    |     |
                                    |    2 |  C  |
                                    |      |  i  |
                                     ------   r  |
                                    |      |  c  |
5Q-QoS-A: CIR-3A ------<>-----------|->  S |  u  |
5Q-QoS-B: CIR-3B ------<>-----------|->  l |  i  |
5Q-QoS-C: CIR-3C ------<>-----------|->  i |  t  |
                                    |    c |     |
                                    |    e |     |
   BE CIR/PIR-3D-------<>-----------|->    |     |
                                    |    3 |     |
                                    |      |     |
                                    +--|---+     |
                                       +---------+
]]></artwork>
            </figure>
            <t>The second model combines the advantages of 5QI-unaware model (per
   slice admission control) with the per traffic class admission
   control, as outlined in <xref target="_figure-20"/>.  Ingress admission control is at
   class granularity for premium classes (CIR only).  Non-premium class
   (i.e.,  Best Effort) has no separate class admission control policy,
   but it is allowed to use the entire slice capacity, which is available at
   any given moment.  I.e., slice capacity, which is not consumed by
   premium classes.  It is a hierarchical model, as depicted in
   <xref target="_figure-21"/>.</t>
            <figure anchor="_figure-21">
              <name>Ingress Slice Admission Control (5QI-aware) - Hierarchical</name>
              <artwork align="center"><![CDATA[
                              Slice
                             policer   +---------+
                   Class        .   +--|---+     |
                  policer      ; :  |      |     |
5Q-QoS-A: CIR-1A ----<>--------|-|--|--> S |     |
5Q-QoS-B: CIR-1B ----<>--------|-|--|--> l |     |
5Q-QoS-C: CIR-1C ----<>--------|-|--|--> i |     |
                               | |  |    c |     |
                               | |  |    e |     |
   BE CIR/PIR-1D --------------|-|--|-->   |  A  |
                               | |  |    1 |  t  |
                               : ;  |      |  t  |
                                .    ------   a  |
                               ; :  |      |  c  |
5Q-QoS-A: CIR-2A ----<>--------|-|--|--> S |  h  |
5Q-QoS-B: CIR-2B ----<>--------|-|--|--> l |  m  |
5Q-QoS-C: CIR-2C ----<>--------|-|--|--> i |  e  |
                               | |  |    c |  n  |
                               | |  |    e |  t  |
   BE CIR/PIR-2D --------------|-|--|-->   |     |
                               | |  |    2 |  C  |
                               : ;  |      |  i  |
                                .    ------   r  |
                               ; :  |      |  c  |
5Q-QoS-A: CIR-3A ----<>--------|-|--|--> S |  u  |
5Q-QoS-B: CIR-3B ----<>--------|-|--|--> l |  i  |
5Q-QoS-C: CIR-3C ----<>---- ---|-|--|--> i |  t  |
                               | |  |    c |     |
                               | |  |    e |     |
   BE CIR/PIR-3D --------------|-|--|-->   |     |
                               | |  |    3 |     |
                               : ;  |      |     |
                                '   +--|---+     |
                                       +---------+
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control-1">
            <name>Outbound Edge Resource Control</name>
            <t><xref target="_figure-22"/> outlines the outbound edge resource control model at the
   transport network layer for 5QI-aware slices.  Each slice is assigned
   multiple egress queues.  The sum of queue weights, which are 5Q QoS
   queue CIRs within the slice, should not exceed the CIR of the slice
   itself.  And, similarly to the 5QI-aware model, the sum of slice CIRs
   should not exceed the physical capacity of the AC.</t>
            <figure anchor="_figure-22">
              <name>Egress Slice Admission Control (5QI-aware)</name>
              <artwork align="center"><![CDATA[
   +---------+        QoS output queues
   |      ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
   |     |   |.-|--------------------------. \|/
---|-----|----> 5Q-QoS-A: w-5Q-QoS-A-CIR   |  |
   |     | S |'-|--------------------------'  |
   |     | l |.-|--------------------------.  |
---|-----|-i--> 5Q-QoS-B: w-5Q-QoS-B-CIR   |  |
   |     | c |'-|--------------------------'  |  weight-Slice-1-CIR
   |     | e |.-|--------------------------.  | shaping-Slice-1-PIR
---|-----|----> 5Q-QoS-C: w-5Q-QoS-C-CIR   |  |
   |     | 1 |'-|--------------------------'  |
   |     |   |.-|--------------------------.  |
---|-----|----> Best Effort (remainder)    |  |
   |     |   |'-|--------------------------' /|\
   |  A   ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
   |  t  |   |.-|--------------------------. \|/
   |  t  |   ||                            |  |
   |  a  |   |'-|--------------------------'  |
   |  c  | S |.-|--------------------------.  |
   |  h  | l ||                            |  |
   |  m  | i |'-|--------------------------'  |  weight-Slice-2-CIR
   |  e  | c |.-|--------------------------.  | shaping-Slice-2-PIR
   |  n  | e ||                            |  |
   |  t  |   |'-|--------------------------'  |
   |     | 2 |.-|--------------------------.  |
   |  C  |   ||                            |  |
   |  i  |   |'-|--------------------------' /|\
   |  r   ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
   |  c  |   |.-|--------------------------. \|/
   |  u  |   ||                            |  |
   |  i  | S |'-|--------------------------'  |
   |  t  | l |.-|--------------------------.  |
   |     | i ||                            |  |
   |     | c |'-|--------------------------'  |  weight-Slice-3-CIR
   |     | e |.-|--------------------------+  | shaping-Slice-3-PIR
   |     |   ||                            |  |
   |     | 3 |'-|--------------------------'  |
   |     |   |.-|--------------------------.  |
   |     |   ||                            |  |
   |     |   |'-|--------------------------' /|\
   |      ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
   +---------+
]]></artwork>
            </figure>
          </section>
        </section>
      </section>
      <section anchor="transit-resource-control">
        <name>Transit Resource Control</name>
        <t>Transit resource control is much simpler than Edge resource control in the provider network.
   As outlined in <xref target="_figure-QoS-5QI-aware"/>, at the provider network edge, 5Q QoS Class marking
   (represented by DSCP related to 5QI set by mobile network functions
   in the packets handed off to the TN) is mapped to the TN QoS Class.
   Based on TN QoS Class, when the packet is encapsulated with outer
   header (MPLS or IPv6), TN QoS Class marking (MPLS TC or IPv6 DSCP in
   outer header, as depicted in Figures <xref format="counter" target="_figure-15"/> and <xref format="counter" target="_figure-16"/>) is set in the
   outer header.  PHB in provider network transit routers is based exclusively on that TN QoS
   Class marking, i.e., original 5G QoS Class DSCP is not taken into
   consideration on transit.</t>
        <t>Provider network transit resource control does not use any inbound interface policy,
   but only outbound interface policy, which is based on priority queue
   combined with weighted or deficit queuing model, without any shaper.
   The main purpose of transit resource control is to ensure that during
   network congestion events, for example caused by network failures and
   temporary rerouting, premium classes are prioritized, and any drops
   only occur in traffic that was de-prioritized by ingress admission control <xref target="sec-inbound-edge-resource-control"/> or in non-premium (best-effort) classes.  Capacity planning and management, as described in <xref target="sec-capacity-planning"/>, ensures that enough
   capacity is available to fulfill all approved slice requests.</t>
      </section>
    </section>
    <section anchor="transport-plane-mapping-models">
      <name>PEs Underlay Transport Mapping Models</name>
      <t>The PEs underlay transport (underlay transport, for short) refers to a specific path forwarding behavior between PEs in order to provide packet delivery that is consistent with the corresponding SLOs. This realization step focuses on controlling the paths that will be used for packet delivery between PEs, independent of the underlying network resource partitioning.</t>
      <t>It is worth noting that TN QoS Classes and underlay transport are
   orthogonal.  The TN domain can be operated with, e.g., 8 TN QoS Classes (representing 8 hardware queues in the
   routers), and two underlay transports (e.g., latency optimized underlay
   transport using link latency metrics for path calculation, and underlay
   transport following Interior Gateway Protocol (IGP) metrics).  TN QoS Class determines the per-hop
   behavior when the packets are transiting through the provider network,
   while underlay transport determines the paths for packets through provider
   network based on the operator's requirements. This path can be optimized or constrained.</t>
      <t>A network operator can define multiple underlay transports within a single NRP. An underlay transport may be realized in multiple ways such as (but not limited to):</t>
      <ul spacing="normal">
        <li>
          <t>A mesh of RSVP-TE <xref target="RFC3209"/> or SR-TE <xref target="RFC9256"/> tunnels created with specific optimization criteria and
   constraints. For example, mesh "A" might represent tunnels optimized for latency, and mesh "B" might represent tunnels optimized for high capacity.</t>
        </li>
        <li>
          <t>A Flex-Algorithm <xref target="RFC9350"/> with a particular metric-type (e.g., latency), or one that only uses links with particular properties (e.g., MACsec link <xref target="IEEE802.1AE"/>), or excludes links that are within a particular geography.</t>
        </li>
      </ul>
      <t>These protocols can be controlled, e.g., by tuning the protocol list under the "underlay-transport" data node defined in the L3VPN Network Model (L3NM) <xref target="RFC9182"/> and the L2VPN Network Model (L2NM) <xref target="RFC9291"/>.</t>
      <t>Also, underlay transports may be realized using separate NRPs. However, such an approach is left out of the scope given the current state of the technology (2024).</t>
      <t>Similar to the QoS mapping models discussed in <xref target="sec-qos-map"/>, for mapping
   to underlay transports at the ingress PE, both 5QI-unaware and 5QI-aware
   models are defined.  Essentially, entire slices can be mapped to
   underlay transports without 5G QoS consideration (5QI-unaware model). For example,
   flows with different 5G QoS Classes, even from same
   slice, can be mapped to different underlay transports (5QI-aware
   model).</t>
      <t><xref target="_figure-23"/> depicts an example of a simple network with two underlay transports,
   each using a mesh of TE tunnels with or without Path Computation Element (PCE) <xref target="RFC5440"/>, and with or without bandwidth
   reservations.
   <xref target="sec-capacity-planning"/> discusses in detail different bandwidth
   models that can be deployed in the provider network.  However,
   discussion about how to realize or orchestrate underlay transports is
   out of scope for this document.</t>
      <figure anchor="_figure-23">
        <name>Example of Underlay Transport Relying on TE Tunnels</name>
        <artwork align="center"><![CDATA[
+---------------+                                    +------+
|  Ingress PE   |   .------------------------------->| PE-A |
|               |   |   .-------------------------->>|      |
|  +---------+  |   |   '---------------------.      +------+
|  |         x------'   .---------------------'
|  |Underlay x--------------------------------.      +------+
|  |Transportx-------------.                  '----->| PE-B |
|  |   A     x-------.  |  |  .---.   .---.   .---->>|      |
|  +---------+  |    |  |  |  |   |   |   |   |      +------+
|               |    |  |  |  |   '---'   '---'
|  +---------+  |    |  |  |  |                      +------+
|  |         o-------|--'  '------------------------>| PE-C |
|  |Underlay o-------|--------'               .---->>|      |
|  |Transporto-------|-----------------.      |      +------+
|  |   B     o-----. '---------------. |      |
|  +---------+  |  | .-. .-. .-. .-. | '------'      +------+
|               |  | | | | | | | | | '-------------->| PE-D |
+---------------+  '-' '-' '-' '-' '--------------->>|      |
                                                     +------+
 x----->   Tunnels of Underlay Transport A
 o---->>   Tunnels of Underlay Transport B
]]></artwork>
      </figure>
      <t>For illustration purposes, <xref target="_figure-23"/> shows only single
   tunnels per underlay transport for (ingress PE, egress PE) pair. However, there might be multiple tunnels within a single underlay transport
   between any pair of PEs.</t>
      <section anchor="qi-unaware-model">
        <name>5QI-unaware Model</name>
        <t>As discussed in <xref target="sec-5QI-unaware"/>, in the 5QI-unware model, the provider network
   doesn't take into account 5G QoS during execution of per-hop
   behavior.  The entire slice is mapped to single TN QoS Class,
   therefore the entire slice is subject to the same per-hop behavior.
   Similarly, in 5QI-unaware PE underlay transport mapping model, the entire
   slice is mapped to a single underlay transport, as depicted in
   <xref target="_figure-24"/>.</t>
        <figure anchor="_figure-24">
          <name>Network Slice to PEs Underlay Transport Mapping (5QI-unaware Model)</name>
          <artwork align="center"><![CDATA[
   +-----------------------------------------+
   |.. .. .. .. .. ..                        |
   :        AC       :      PE               |
   :+---------------+:                       |
   :|  SDP          |:                       |
   :|  +----------+ |:                       |
   :|  |     NS 1 +----------+               |
   :|  +----------+ |:       |               |
   :+---------------+:       |               |
   :+---------------+:       |   +---------+ |
   :|  SDP          |:       |   |         | |
   :|  +----------+ |:       |   |Underlay | |
   :|  |     NS 2 +------+   +--->Transport| |
   :|  +----------+ |:   |   |   |    A    | |
   :+---------------+:   |   |   |         | |
   :+---------------+:   |   |   +---------+ |
   :|  SDP          |:   |   |               |
   :|  +----------+ |:   |   |               |
   :|   |     NS 3 +-----+   |               |
   :|  +----------+ |:   |   |   +---------+ |
   :+---------------+:   |   |   |         | |
   :+---------------+:   |   |   |Underlay | |
   :|  SDP          |:   +------->Transport| |
   :|  +----------+ |:   |   |   |    B    | |
   :|  |     NS 4 +------+   |   |         | |
   :|  +----------+ |:       |   +---------+ |
   :+---------------+:       |               |
   :+---------------+:       |               |
   :|  SDP          |:       |               |
   :|  +----------+ |:       |               |
   :|  |     NS 5 +----------+               |
   :|  +----------+ |:                       |
   :+---------------+:                       |
   '.. .. .. .. .. ..                        |
   +-----------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="qi-aware-model-1">
        <name>5QI-aware Model</name>
        <t>In 5QI-aware model, the traffic can be mapped to underlay transports at
   the granularity of 5G QoS Class.  Given that the potential number of
   underlay transports is limited, packets from multiple 5G QoS Classes
   with similar characteristics are mapped to a common underlay transport,
   as depicted in <xref target="_figure-25"/>.</t>
        <figure anchor="_figure-25">
          <name>Network Slice to Underlay Transport Mapping (5QI-aware Model)</name>
          <artwork align="center"><![CDATA[
     +-------------------------------------------+
     |.. .. .. .. .. ..                          |
     :        AC       :      PE                 |
     :+---------------+:                         |
   R :|  SDP          |:                         |
   F :|  +----------+ |:                         |
   C :|  | 5G QoS A +------+                     |
   9 :|  +----------+ |:   |                     |
   5 :|  +----------+ |:   |                     |
   4 :|  | 5G QoS B +------+                     |
   3 :|  +----------+ |:   |         +---------+ |
     :|  +----------+ |:   |         |         | |
   N :|  | 5G QoS C +-----------+    |Underlay | |
   S :|  +----------+ |:   +--------->Transport| |
     :|  +----------+ |:   |    |    |    A    | |
   1 :|  | 5G QoS D +-----------+    |         | |
     :|  +----------+ |:   |    |    +---------+ |
     :+---------------+:   |    |                |
   R :+---------------+:   |    |                |
   F :|  +----------+ |:   |    |                |
   C :|  | 5G QoS A +------+    |    +---------+ |
   9 :|  +----------+ |:   |    |    |         | |
   5 :|  +----------+ |:   |    |    |Underlay | |
   4 :|  | 5G QoS E +------+    +---->Transport| |
   3 :|  +----------+ |:        |    |    B    | |
     :|  +----------+ |:        |    |         | |
   N :|  | 5G QoS F +-----------+    +---------+ |
   S :|  +----------+ |:        |                |
     :|  +----------+ |:        |                |
   2 :|  | 5G QoS G +-----------+                |
     :|  +----------+ |:                         |
     :|  SDP          |:                         |
     :+---------------+:                         |
     '.. .. .. .. .. ..                          |
     +-------------------------------------------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-capacity-planning">
      <name>Capacity Planning/Management</name>
      <section anchor="bandwidth-requirements">
        <name>Bandwidth Requirements</name>
        <t>This section describes the information conveyed by the 5G NSO to the
   NSC with respect to slice bandwidth requirements.</t>
        <t><xref target="_figure-multi-DC"/> shows three DCs that contain instances of network
   functions.  Also shown are PEs that have links to the DCs.  The PEs
   belong to the provider network.  Other details of the provider
   network, such as P-routers and transit links are not shown.  Also
   details of the DC infrastructure in customer sites, such as switches and routers, are not
   shown.</t>
        <t>The 5G NSO is aware of the existence of the network functions and their
   locations.  However, it is not aware of the details of the provider
   network.  The NSC has the opposite view - it is
   aware of the provider network infrastructure and the links between the PEs
   and the DCs, but is not aware of the individual network functions at customer sites.</t>
        <figure anchor="_figure-multi-DC">
          <name>An Example of Multi-DC Architecture</name>
          <artwork align="center"><![CDATA[
+ - - - - DC 1- - - -+   + - - - - - - - - +   + - - - - DC 2- - - -+
| +------+           |  +----+         +----+  |           +------+ |
| | NF1A |           +--*PE1A|         |PE2A*--+           | NF2A | |
| +------+           |  +----+         +----+  |           +------+ |
| +------+           |   |                 |   |           +------+ |
| | NF1B |           |   |                 |   |           | NF2B | |
| +------+           |   |                 |   |           +------+ |
| +------+           |  +----+         +----+  |           +------+ |
| | NF1C |           +--*PE1B|         |PE2B*--+           | NF2C | |
| +------+           |  +----+         +----+  |           +------+ |
+ - - - - - - - - - -+   |    Provider     |   + - - - - - - - - - -+
                         |                 |                         
                         |     Network     |   + - - - - DC 3- - - -+
                         |             +----+  |           +------+ |
                         |             |PE3A*--+           | NF3A | |
                         |             +----+  |           +------+ |
                         |                 |   |           +------+ |
                         |                 |   |           | NF3B | |
                         |                 |   |           +------+ |
                         |             +----+  |           +------+ |
                         |             |PE3B*--+           | NF3C | |
                         |             +----+  |           +------+ |
                         + - - - - - - - - +   + - - - - - - - - - -+
                                                                     
  * SDP, with fine-grained QoS (dedicated resources per RFC 9543 NS)   
]]></artwork>
        </figure>
        <t>Let us consider 5G slice "X" that uses some of the network functions in
   the three DCs.  If this slice has latency requirements, the 5G NSO will
   have taken those into account when deciding which NF instances
   in which DC are to be invoked for this slice.  As a result of such a
   placement decision, the three DCs shown are involved in 5G slice "X",
   rather than other DCs.  For its decision-making, the 5G NSO
   needs information from the NSC about the observed latency between DCs.
   Preferably, the NSC would present the topology in an abstracted form,
   consisting of point-to-point abstracted links between pairs of DCs
   and associated latency and, optionally, delay variation and link loss
   values.  It would be valuable to have a mechanism for the 5G NSO to
   inform the NSC which DC-pairs are of interest for these metrics -
   there may be of order thousands of DCs, but the 5G NSO will only be
   interested in these metrics for a small fraction of all the possible
   DC-pairs, i.e. those in the same region of the provider network.  The
   mechanism for conveying the information is out of scope for this document.</t>
        <t><xref target="_table-x"/> shows the matrix of bandwidth demands for 5G slice "X".
   Within the slice, multiple NF instances might be
   sending traffic from DCi to DCj.  However, the 5G NSO sums the
   associated demands into one value.  For example, "NF1A" and "NF1B" in "DC1"
   might be sending traffic to multiple NFs in "DC2", but this is
   expressed as one value in the traffic matrix: the total bandwidth
   required for 5G slice "X" from "DC1" to "DC2" (8 units).  Each row in the
   right-most column in the traffic matrix shows the total amount of
   traffic going from a given DC into the transport network, regardless
   of the destination DC.  Note that this number can be less than the
   sum of DC-to-DC demands in the same row, on the basis that not all
   the NFs are likely to be sending at their maximum rate
   simultaneously.  For example, the total traffic from "DC1" for slice "X"
   is 11 units, which is less than the sum of the DC-to-DC demands in
   the same row (13 units).  Note, as described in <xref target="sec-qos-map"/>, a slice
   may have per-QoS class bandwidth requirements, and may have CIR and
   PIR limits.  This is not included in the example, but the same
   principles apply in such cases.</t>
        <table anchor="_table-x">
          <name>Inter-DC Traffic Demand Matrix (Slice X)</name>
          <thead>
            <tr>
              <th align="left">From/To</th>
              <th align="left">DC 1</th>
              <th align="left">DC 2</th>
              <th align="left">DC 3</th>
              <th align="center">Total from DC</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">DC 1</td>
              <td align="left">n/a</td>
              <td align="left">8</td>
              <td align="left">5</td>
              <td align="center">11.0</td>
            </tr>
            <tr>
              <td align="left">DC 2</td>
              <td align="left">1</td>
              <td align="left">n/a</td>
              <td align="left">2</td>
              <td align="center">2.5</td>
            </tr>
            <tr>
              <td align="left">DC 3</td>
              <td align="left">4</td>
              <td align="left">7</td>
              <td align="left">n/a</td>
              <td align="center">10.0</td>
            </tr>
          </tbody>
        </table>
        <t><xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> can be used to convey all
   of the information in the traffic matrix to an NSC.  The
   NSC applies policers corresponding to the last column in the traffic
   matrix to the appropriate PE routers, in order to enforce the
   bandwidth contract.  For example, it applies a policer of 11 units to
   PE1A and PE1B that face DC1, as this is the total bandwidth that DC1
   sends into the provider network corresponding to Slice X.  Also, the
   controller may apply shapers in the direction from the TN to the DC,
   if otherwise there is the possibility of a link in the DC being
   oversubscribed.  Note that a peer NF endpoint of an AC can be
   identified using 'peer-sap-id' as defined in <xref target="RFC9408"/>.</t>
        <t>Depending on the bandwidth model used in the provider network (<xref target="sec-bw"/>),
   the other values in the matrix, i.e., the DC-to-DC demands, may not
   be directly applied to the provider network.  Even so, the
   information may be useful to the NSC for capacity planning and
   failure simulation purposes.  If, on the other hand, the DC-to-DC
   demand information is not used by the NSC, the IETF YANG Data
   Model for L3VPN Service Delivery <xref target="RFC8299"/> or the IETF YANG Data
   Model for L2VPN Service Delivery <xref target="RFC8466"/> could be used instead of
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>, as they support
   conveying the bandwidth information in the right-most column of the
   traffic matrix.</t>
        <t>The provider network may be implemented in such a way that it has
   various types of paths, for example low-latency traffic might be
   mapped onto a different transport path to other traffic (for example
   a particular Flex-Algorithm, a particular set of TE paths, or a specific queue <xref target="RFC9330"/>), as discussed
   in <xref target="sec-qos-map"/>.  The 5G NSO can use
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> to request low-latency
   transport for a given slice if required.  However, <xref target="RFC8299"/> or
   <xref target="RFC8466"/> do not support requesting a particular transport-type,
   e.g., low-latency.  One option is to augment these models to convey
   this information.  This can be achieved by reusing the 'underlay-
   transport' construct defined in <xref target="RFC9182"/> and <xref target="RFC9291"/>.</t>
      </section>
      <section anchor="sec-bw">
        <name>Bandwidth Models</name>
        <t>This section describes three bandwidth management schemes that could
   be employed in the provider network.  Many variations are possible,
   but each example describes the salient points of the corresponding
   scheme.  Schemes 2 and 3 use TE; other variations on TE are possible
   as described in <xref target="RFC9522"/>.</t>
        <section anchor="scheme-1-shortest-path-forwarding-spf">
          <name>Scheme 1: Shortest Path Forwarding (SPF)</name>
          <t>Shortest path forwarding is used according to the IGP metric.  Given
   that some slices are likely to have latency SLOs, the IGP metric on
   each link can be set to be in proportion to the latency of the link.
   In this way, all traffic follows the minimum latency path between
   endpoints.</t>
          <t>In Scheme 1, although the operator provides bandwidth guarantees to
   the slice customers, there is no explicit end-to-end underpinning of
   the bandwidth SLO, in the form of bandwidth reservations across the
   provider network.  Rather, the expected performance is achieved via
   capacity planning, based on traffic growth trends and anticipated
   future demands, in order to ensure that network links are not over-
   subscribed.  This scheme is analogous to that used in many existing
   business VPN deployments, in that bandwidth guarantees are provided
   to the customers but are not explicitly underpinned end to end across
   the provider network.</t>
          <t>A variation on the scheme is that Flex-Algorithm <xref target="RFC9350"/> is used. For example, one Flex-Algorithm could
   use latency-based metrics and another Flex-Algorithm could use the IGP
   metric. There would be a many-to-one mapping of Network Slices to Flex-Algorithms.</t>
          <t>While Scheme 1 is technically feasible, it is vulnerable to
   unexpected changes in traffic patterns and/or network element
   failures resulting in congestion.  This is because, unlike Schemes 2
   and 3 which employ TE, traffic cannot be diverted from the shortest
   path.</t>
        </section>
        <section anchor="scheme-2-te-paths-with-fixed-bandwidth-reservations">
          <name>Scheme 2: TE Paths with Fixed Bandwidth Reservations</name>
          <t>Scheme 2 uses RSVP-TE <xref target="RFC3209"/> or SR-TE paths <xref target="RFC9256"/> with fixed bandwidth
   reservations.  By "fixed", we mean a value that stays constant over
   time, unless the 5G NSO communicates a change in slice bandwidth
   requirements, due to the creation or modification of a slice.  Note
   that the "reservations" would be in the mind of the transport
   controller - it is not necessary (or indeed possible for SR-TE) to
   reserve bandwidth at the network layer.  The bandwidth requirement
   acts as a constraint whenever the controller (re)computes a path.  There could be a single mesh of paths between endpoints that
   carry all of the traffic types, or there could be a small handful of
   meshes, for example one mesh for low-latency traffic that follows the
   minimum latency path and another mesh for the other traffic that
   follows the minimum IGP metric path, as described in <xref target="sec-qos-map"/>.
   There would be a many-to-one mapping of slices to paths.</t>
          <t>The bandwidth requirement from DCi to DCj is the sum of the DCi-DCj
   demands of the individual slices.  For example, if only slices "X" and
   "Y" are present, then the bandwidth requirement from "DC1" to "DC2"
   is 12 units (8 units for slice "X" (<xref target="_table-x"/>) and 4 units for slice "Y" (<xref target="_table-y"/>)).  When the
   5G NSO requests a new slice, the NSC, in its mind,
   increments the bandwidth requirement according to the requirements of
   the new slice.  For example, in <xref target="_figure-multi-DC"/>, suppose a new slice is
   instantiated that needs 0.8 Gbps from "DC1" to "DC2".  The transport
   controller would increase its notion of the bandwidth requirement
   from "DC1" to "DC2" from 12 Gbps to 12.8 Gbps to accommodate the
   additional expected traffic.</t>
          <table anchor="_table-y">
            <name>Inter-DC Traffic Demand Matrix (Slice Y)</name>
            <thead>
              <tr>
                <th align="left">From/To</th>
                <th align="left">DC 1</th>
                <th align="left">DC 2</th>
                <th align="left">DC 3</th>
                <th align="center">Total from DC</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">DC 1</td>
                <td align="left">n/a</td>
                <td align="left">4</td>
                <td align="left">2.5</td>
                <td align="center">6.0</td>
              </tr>
              <tr>
                <td align="left">DC 2</td>
                <td align="left">0.5</td>
                <td align="left">n/a</td>
                <td align="left">0.8</td>
                <td align="center">1.0</td>
              </tr>
              <tr>
                <td align="left">DC 3</td>
                <td align="left">2.6</td>
                <td align="left">3</td>
                <td align="left">n/a</td>
                <td align="center">5.1</td>
              </tr>
            </tbody>
          </table>
          <t>In the example, each DC has two PEs facing it for reasons of
   resilience.  The NSC needs to determine how to map
   the "DC1" to "DC2" bandwidth requirement to bandwidth reservations of TE
   LSPs from "DC1" to "DC2".  For example, if the routing configuration is
   arranged such that in the absence of any network failure, traffic
   from "DC1" to "DC2" always enters "PE1A" and goes to "PE2A", the controller
   reserves 12.8 Gbps of bandwidth on the path from "PE1A" to "PE2A".  If, on
   the other hand, the routing configuration is arranged such that in
   the absence of any network failure, traffic from "DC1" to "DC2" always
   enters "PE1A" and is load-balanced across "PE2A" and "PE2B", the controller
   reserves 6.4 Gbps of bandwidth on the path from "PE1A" to "PE2A" and
   6.4 Gbps of bandwidth on the path from "PE1A" to "PE2B".  It might be tricky
   for the NSC to be aware of all conditions that
   change the way traffic lands on the various PEs, and therefore know
   that it needs to change bandwidth reservations of paths accordingly.
   For example, there might be an internal failure within "DC1" that
   causes traffic from "DC1" to land on "PE1B", rather than "PE1A".  The
   NSC may not be aware of the failure and therefore
   may not know that it now needs to apply bandwidth reservations to
   paths from "PE1B" to "PE2A" / "PE2B".</t>
        </section>
        <section anchor="scheme-3-te-paths-without-bandwidth-reservation">
          <name>Scheme 3: TE Paths without Bandwidth Reservation</name>
          <t>Like Scheme 2, Scheme 3 uses RSVP-TE or SR-TE paths.  There could be a
   single mesh of paths between endpoints that carry all of the traffic
   types, or there could be a small handful of meshes, for example one
   mesh for low-latency traffic that follows the minimum latency path
   and another mesh for the other traffic that follows the minimum IGP
   metric path, as described in <xref target="sec-qos-map"/>.  There would be a many-to-one
   mapping of slices to paths.</t>
          <t>The difference between Scheme 2 and Scheme 3 is that Scheme 3 does
   not have fixed bandwidth reservations for the paths.  Instead, actual
   measured data-plane traffic volumes are used to influence the
   placement of TE paths.  One way of achieving this is to use
   distributed RSVP-TE with auto-bandwidth.  Alternatively, the
   NSC can use telemetry-driven automatic congestion
   avoidance.  In this approach, when the actual traffic volume in the
   data plane on given link exceeds a threshold, the controller, knowing
   how much actual data plane traffic is currently travelling along each
   RSVP or SR-TE path, can tune the paths of one or more paths using the
   link such that they avoid that link. This approach is similar to that described in <xref section="4.3.1" sectionFormat="of" target="RFC9522"/>.</t>
          <t>It would be undesirable to move a path that has latency as its cost function, rather than
   another type of path, in order to ease the congestion, as the altered path
   will typically have a higher latency.  This can be avoided by
   designing the algorithms described in the previous paragraph such
   that they avoid moving minimum-latency paths unless there is no
   alternative.</t>
        </section>
      </section>
    </section>
    <section anchor="network-slicing-oam">
      <name>Network Slicing OAM</name>
      <t>The deployment and maintenance of slices within a network imply
   that a set of OAM functions (<xref target="RFC6291"/>) need to be deployed by the providers, e.g.:</t>
      <ul spacing="normal">
        <li>
          <t>Providers should be able to execute OAM tasks on a per Network Slice
basis. These tasks can cover the "full" slice within a domain or a
portion of that slice (for troubleshooting purposes, for example).  </t>
          <t>
For example, per-slice OAM tasks can consist of (but not limited to):  </t>
          <ul spacing="normal">
            <li>
              <t>tracing resources that are bound to a given Network Slice,</t>
            </li>
            <li>
              <t>tracing resources that are invoked when forwarding a given flow bound to a given Network Slice,</t>
            </li>
            <li>
              <t>assessing whether flow isolation characteristics are in
conformance with the Network Slice Service requirements, or</t>
            </li>
            <li>
              <t>assessing the compliance of the allocated Network Slice resources against flow/
customer service requirements.</t>
            </li>
          </ul>
          <t>
<xref target="RFC7276"/> provides an overview of available OAM
tools. These technology-specific tools can be reused in the context
of network slicing. Providers that deploy network slicing
capabilities should be able to select whatever OAM technology or specific feature that would address their needs.</t>
        </li>
        <li>
          <t>Providers may want to enable differentiated failure
detect and repair features for a subset of network
slices. For example, a given Network Slice may require fast detect and
repair mechanisms, while others may
not be engineered with such means. The provider can use
techniques such as <xref target="RFC5286"/>, <xref target="RFC5714"/>, or <xref target="RFC8355"/>.</t>
        </li>
        <li>
          <t>Providers may deploy means to dynamically discover the set of Network Slices that
are enabled within its network. Such dynamic discovery capability
facilitates the detection of any mismatch between the view
maintained by the control/management plane and the actual network
configuration.  When mismatches are detected, corrective actions
should be undertaken accordingly. For example, a provider may rely
upon the L3NM <xref target="RFC9182"/> or the L2NM <xref target="RFC9291"/> to maintain the full
set of L3VPN/L2VPNs that are used to deliver Network Slice Services.
The correlation between an LxVPN instance and a Network Slice Service
is maintained using "parent-service-id" attribute (<xref section="7.3" sectionFormat="of" target="RFC9182"/>).</t>
        </li>
        <li>
          <t>Means to report a set of network performance metrics to assess
whether the agreed slice service objectives are honored. These means are used for SLO monitoring and violation detect purposes. For example,
<xref target="RFC9375"/> can be used to report links' one-way delay,
one-way delay variation, etc. Both conventional active/passive
measurement methods <xref target="RFC7799"/> and more recent telemetry methods
(e.g., YANG Push <xref target="RFC8641"/>) can be used.</t>
        </li>
        <li>
          <t>Means to report and expose observed performance metrics and other OAM state to customer.
For example, <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> exposes a set of statistics per SDP, connectivity construct, and connection group.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-sca-impli">
      <name>Scalability Implications</name>
      <t>The mapping between 5G slice to TN slices (see <xref target="sec-mapping"/>) is a design choice of service operators that may be a function of, e.g., the number of instantiated slices, requested services, or local engineering capabilities and guidelines. However, operators should carefully consider means to ease slice migration strategies. For example, a provider may initially adopt a 1-to-1 mapping if it has to instantiate just a few Network Slices and accommodate the need of only a few customers. That provider may decide to move to a N-to-1 mapping for aggregation/scalability purposes if sustained increased slice demand is observed.</t>
      <t>Putting in place adequate automation means to realize Network Slices (including the adjustment of Slice Services to Network Slices mapping) would ease slice migration operations.</t>
      <t>The realization model described in the document inherits the scalability properties of the underlying L2VPN and L3VPN technologies (<xref target="sec-over-rea-model"/>). Readers may refer, for example, to <xref section="13" sectionFormat="of" target="RFC4365"/> or <xref section="1.2.5" sectionFormat="of" target="RFC6624"/> for a scalability assessment of some of these technologies. Providers may adjust the mapping model to better handle local scalability constraints.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document does not make any IANA request.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t><xref section="10" sectionFormat="of" target="RFC9543"/> discusses generic security considerations that are applicable to network slicing, with a focus on the following considerations:</t>
      <ul spacing="normal">
        <li>
          <t>Conformance to security constraints:  </t>
          <t>
Specific security requests, such as not routing traffic through a particular geographical region can be met by mapping the traffic to an underlay transport that avoids that region.</t>
        </li>
        <li>
          <t>IETF NSC authentication:  </t>
          <t>
This is out of the scope for this document. It should be addressed in documents that describe IETF NSC realization (e.g., <xref target="I-D.ietf-teas-ns-controller-models"/>).</t>
        </li>
        <li>
          <t>Specific isolation criteria:  </t>
          <t>
Adequate admission control policies, for example policers as described in <xref target="sec-inbound-edge-resource-control"/>, should be configured in the edge of the provider network to control access to specific slice resources. This prevents the possibility of one slice consuming resources at the expense of other slices. Likewise, access to classification and mapping tables have to be controlled to prevent misbehaviors (an unauthorized entity may modify the table to bind traffic to a random slice, redirect the traffic, etc.). Network devices have to check that a required access privilege is provided before granting access to specific data or performing specific actions.</t>
        </li>
        <li>
          <t>Data Confidentiality and Integrity of an IETF Network Slice:  </t>
          <t>
As described in <xref section="5.1.2.1" sectionFormat="of" target="RFC9543"/>, the customer might request an SLE that mandates encryption. As described in <xref target="transport-plane-mapping-models"/>, this can be achieved, e.g., by mapping the traffic to an underlay transport that uses only MACsec-encrypted links.</t>
        </li>
      </ul>
      <t>Many of the YANG modules cited in this document define schema for data that is designed to be accessed via network management protocols such as NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>. The lowest NETCONF layer is the secure transport layer, and the mandatory-to-implement secure transport is Secure Shell (SSH) <xref target="RFC6242"/>. The lowest RESTCONF layer is HTTPS, and the mandatory-to-implement secure transport is TLS <xref target="RFC8446"/>.</t>
      <t>The NETCONF access control model <xref target="RFC8341"/> provides the means to restrict access for particular NETCONF or RESTCONF users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.</t>
      <t>In order to avoid the need for a mapping table to associate source/destination IP
addresses and slices' specific S-NSSAIs, <xref target="sec-ip-hof"/> describes an approach where some or all S-NSSAI bits
are embedded in an IPv6 address using an algorithm approach. An attacker from within the transport network
who has access to the mapping configuration may infer the slices to which belong a packet. It may also
alter these bits which may lead to steering the packet via a distinct network slice, and thus lead to
service disruption. Note that such an on-path attacker may make more damage (e.g., randomly drop packets).</t>
      <t>Security considerations specific to each of the technologies and protocols listed in the document are discussed in the specification documents of each of these protocols.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9543">
          <front>
            <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="J. Drake" initials="J." role="editor" surname="Drake"/>
            <author fullname="R. Rokui" initials="R." surname="Rokui"/>
            <author fullname="S. Homma" initials="S." surname="Homma"/>
            <author fullname="K. Makhijani" initials="K." surname="Makhijani"/>
            <author fullname="L. Contreras" initials="L." surname="Contreras"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document describes network slicing in the context of networks built from IETF technologies. It defines the term "IETF Network Slice" to describe this type of network slice and establishes the general principles of network slicing in the IETF context.</t>
              <t>The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and the mapping of abstract requests to more specific technologies. The document also discusses related considerations with monitoring and security.</t>
              <t>This document also provides definitions of related terms to enable consistent usage in other IETF documents that describe or use aspects of IETF Network Slices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9543"/>
          <seriesInfo name="DOI" value="10.17487/RFC9543"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC7608">
          <front>
            <title>IPv6 Prefix Length Recommendation for Forwarding</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Petrescu" initials="A." surname="Petrescu"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>IPv6 prefix length, as in IPv4, is a parameter conveyed and used in IPv6 routing and forwarding processes in accordance with the Classless Inter-domain Routing (CIDR) architecture. The length of an IPv6 prefix may be any number from zero to 128, although subnets using stateless address autoconfiguration (SLAAC) for address allocation conventionally use a /64 prefix. Hardware and software implementations of routing and forwarding should therefore impose no rules on prefix length, but implement longest-match-first on prefixes of any valid length.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="198"/>
          <seriesInfo name="RFC" value="7608"/>
          <seriesInfo name="DOI" value="10.17487/RFC7608"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC6242">
          <front>
            <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
            <author fullname="M. Wasserman" initials="M." surname="Wasserman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6242"/>
          <seriesInfo name="DOI" value="10.17487/RFC6242"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="_5G-Book" target="https://5g.systemsapproach.org/">
          <front>
            <title>5G Mobile Networks: A Systems Approach</title>
            <author fullname="Larry Peterson">
              <organization/>
            </author>
            <author fullname="Oguz Sunay">
              <organization/>
            </author>
            <author fullname="Bruce Davie">
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="TR-GSTR-TN5G" target="https://www.itu.int/dms_pub/itu-t/opb/tut/T-TUT-HOME-2018-PDF-E.pdf">
          <front>
            <title>Technical Report GSTR-TN5G</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2018" month="February"/>
          </front>
        </reference>
        <reference anchor="TS-23.501" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId-3144">
          <front>
            <title>TS 23.501: System architecture for the 5G System (5GS)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="TS-28.530" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId-3273">
          <front>
            <title>TS 23.530: Management and orchestration; Concepts, use cases and requirements)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="O-RAN.WG9.XPSAAS" target="https://www.o-ran.org/specifications">
          <front>
            <title>O-RAN.WG9.XPSAAS: O-RAN WG9 Xhaul Packet Switched Architectures and Solutions Version 04.00</title>
            <author>
              <organization>O-RAN Alliance</organization>
            </author>
            <date year="2023" month="March"/>
          </front>
        </reference>
        <reference anchor="NG.113" target="https://www.gsma.com/newsroom/wp-content/uploads//NG.113-v4.0.pdf">
          <front>
            <title>NG.113: 5GS Roaming Guidelines Version 4.0</title>
            <author>
              <organization>GSMA</organization>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
        <reference anchor="IEEE802.1AE" target="https://1.ieee802.org/security/802-1ae/">
          <front>
            <title>802.1AE: MAC Security (MACsec)</title>
            <author>
              <organization>IEEE</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ECPRI" target="http://www.cpri.info/downloads/eCPRI_v_2.0_2019_05_10c.pdf">
          <front>
            <title>Common Public Radio Interface: eCPRI Interface Specification</title>
            <author>
              <organization>Common Public Radio Interface</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-teas-5g-network-slice-application">
          <front>
            <title>IETF Network Slice Application in 3GPP 5G End-to-End Network Slice</title>
            <author fullname="Xuesong Geng" initials="X." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Jie Dong" initials="J." surname="Dong">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Ivan Bykov" initials="I." surname="Bykov">
              <organization>Ribbon Communications</organization>
            </author>
            <date day="10" month="June" year="2024"/>
            <abstract>
              <t>   Network Slicing is one of the core features of 5G defined in 3GPP,
   which provides different network service as independent logical
   networks.  To provide 5G network slices services, an end-to-end
   network slice has to span three network segments: Radio Access
   Network (RAN), Mobile Core Network (CN) and Transport Network (TN).
   This document describes the application of the IETF network slice
   framework in providing 5G end-to-end network slices, including
   network slice mapping in the management, control and data planes.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-network-slice-application-03"/>
        </reference>
        <reference anchor="RFC4664">
          <front>
            <title>Framework for Layer 2 Virtual Private Networks (L2VPNs)</title>
            <author fullname="L. Andersson" initials="L." role="editor" surname="Andersson"/>
            <author fullname="E. Rosen" initials="E." role="editor" surname="Rosen"/>
            <date month="September" year="2006"/>
            <abstract>
              <t>This document provides a framework for Layer 2 Provider Provisioned Virtual Private Networks (L2VPNs). This framework is intended to aid in standardizing protocols and mechanisms to support interoperable L2VPNs. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4664"/>
          <seriesInfo name="DOI" value="10.17487/RFC4664"/>
        </reference>
        <reference anchor="RFC8986">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8986"/>
          <seriesInfo name="DOI" value="10.17487/RFC8986"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-teas-attachment-circuit">
          <front>
            <title>YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACaaS)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="24" month="July" year="2024"/>
            <abstract>
              <t>   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   before or during service provisioning (e.g., Network Slice Service).
   The document also specifies a service model for managing bearers over
   which ACs are established.

   Also, the document specifies a set of reusable groupings.  Whether
   other service models reuse structures defined in the AC models or
   simply include an AC reference is a design choice of these service
   models.  Utilizing the AC service model to manage ACs over which a
   service is delivered has the advantage of decoupling service
   management from upgrading AC components to incorporate recent AC
   technologies or features.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-attachment-circuit-14"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-ntw-attachment-circuit">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="24" month="July" year="2024"/>
            <abstract>
              <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., VPN, Network Slice Service).  A
   companion service model is specified in the YANG Data Models for
   Bearers and 'Attachment Circuits'-as-a-Service (ACaaS) (I-D.ietf-
   opsawg-teas-attachment-circuit).

   The module augments the base network ('ietf-network') and the Service
   Attachment Point (SAP) models with the detailed information for the
   provisioning of attachment circuits in Provider Edges (PEs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ntw-attachment-circuit-12"/>
        </reference>
        <reference anchor="RFC8969">
          <front>
            <title>A Framework for Automating Service and Network Management with YANG</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Geng" initials="L." surname="Geng"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>Data models provide a programmatic approach to represent services and networks. Concretely, they can be used to derive configuration information for network and service components, and state information that will be monitored and tracked. Data models can be used during the service and network management life cycle (e.g., service instantiation, service provisioning, service optimization, service monitoring, service diagnosing, and service assurance). Data models are also instrumental in the automation of network management, and they can provide closed-loop control for adaptive and deterministic service creation, delivery, and maintenance.</t>
              <t>This document describes a framework for service and network management automation that takes advantage of YANG modeling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a data model; thus, it can accommodate YANG modules that are developed outside the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8969"/>
          <seriesInfo name="DOI" value="10.17487/RFC8969"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang">
          <front>
            <title>A YANG Data Model for the RFC 9543 Network Slice Service</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="John Mullooly" initials="J." surname="Mullooly">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <date day="9" month="May" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for RFC 9543 Network Slice
   Service.  The model can be used in the Network Slice Service
   interface between a customer and a provider that offers RFC 9543
   Network Slice Services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-13"/>
        </reference>
        <reference anchor="RFC9522">
          <front>
            <title>Overview and Principles of Internet Traffic Engineering</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes the principles of traffic engineering (TE) in the Internet. The document is intended to promote better understanding of the issues surrounding traffic engineering in IP networks and the networks that support IP networking and to provide a common basis for the development of traffic-engineering capabilities for the Internet. The principles, architectures, and methodologies for performance evaluation and performance optimization of operational networks are also discussed.</t>
              <t>This work was first published as RFC 3272 in May 2002. This document obsoletes RFC 3272 by making a complete update to bring the text in line with best current practices for Internet traffic engineering and to include references to the latest relevant work in the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9522"/>
          <seriesInfo name="DOI" value="10.17487/RFC9522"/>
        </reference>
        <reference anchor="RFC4026">
          <front>
            <title>Provider Provisioned Virtual Private Network (VPN) Terminology</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson"/>
            <author fullname="T. Madsen" initials="T." surname="Madsen"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The widespread interest in provider-provisioned Virtual Private Network (VPN) solutions lead to memos proposing different and overlapping solutions. The IETF working groups (first Provider Provisioned VPNs and later Layer 2 VPNs and Layer 3 VPNs) have discussed these proposals and documented specifications. This has lead to the development of a partially new set of concepts used to describe the set of VPN services.</t>
              <t>To a certain extent, more than one term covers the same concept, and sometimes the same term covers more than one concept. This document seeks to make the terminology in the area clearer and more intuitive. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4026"/>
          <seriesInfo name="DOI" value="10.17487/RFC4026"/>
        </reference>
        <reference anchor="RFC4176">
          <front>
            <title>Framework for Layer 3 Virtual Private Networks (L3VPN) Operations and Management</title>
            <author fullname="Y. El Mghazli" initials="Y." role="editor" surname="El Mghazli"/>
            <author fullname="T. Nadeau" initials="T." surname="Nadeau"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="K. Chan" initials="K." surname="Chan"/>
            <author fullname="A. Gonguet" initials="A." surname="Gonguet"/>
            <date month="October" year="2005"/>
            <abstract>
              <t>This document provides a framework for the operation and management of Layer 3 Virtual Private Networks (L3VPNs). This framework intends to produce a coherent description of the significant technical issues that are important in the design of L3VPN management solutions. The selection of specific approaches, and making choices among information models and protocols are outside the scope of this document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4176"/>
          <seriesInfo name="DOI" value="10.17487/RFC4176"/>
        </reference>
        <reference anchor="RFC6136">
          <front>
            <title>Layer 2 Virtual Private Network (L2VPN) Operations, Administration, and Maintenance (OAM) Requirements and Framework</title>
            <author fullname="A. Sajassi" initials="A." role="editor" surname="Sajassi"/>
            <author fullname="D. Mohan" initials="D." role="editor" surname="Mohan"/>
            <date month="March" year="2011"/>
            <abstract>
              <t>This document provides framework and requirements for Layer 2 Virtual Private Network (L2VPN) Operations, Administration, and Maintenance (OAM). The OAM framework is intended to provide OAM layering across L2VPN services, pseudowires (PWs), and Packet Switched Network (PSN) tunnels. This document is intended to identify OAM requirements for L2VPN services, i.e., Virtual Private LAN Service (VPLS), Virtual Private Wire Service (VPWS), and IP-only LAN Service (IPLS). Furthermore, if L2VPN service OAM requirements impose specific requirements on PW OAM and/or PSN OAM, those specific PW and/or PSN OAM requirements are also identified. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6136"/>
          <seriesInfo name="DOI" value="10.17487/RFC6136"/>
        </reference>
        <reference anchor="RFC7422">
          <front>
            <title>Deterministic Address Mapping to Reduce Logging in Carrier-Grade NAT Deployments</title>
            <author fullname="C. Donley" initials="C." surname="Donley"/>
            <author fullname="C. Grundemann" initials="C." surname="Grundemann"/>
            <author fullname="V. Sarawat" initials="V." surname="Sarawat"/>
            <author fullname="K. Sundaresan" initials="K." surname="Sundaresan"/>
            <author fullname="O. Vautrin" initials="O." surname="Vautrin"/>
            <date month="December" year="2014"/>
            <abstract>
              <t>In some instances, Service Providers (SPs) have a legal logging requirement to be able to map a subscriber's inside address with the address used on the public Internet (e.g., for abuse response). Unfortunately, many logging solutions for Carrier-Grade NATs (CGNs) require active logging of dynamic translations. CGN port assignments are often per connection, but they could optionally use port ranges. Research indicates that per-connection logging is not scalable in many residential broadband services. This document suggests a way to manage CGN translations in such a way as to significantly reduce the amount of logging required while providing traceability for abuse response. IPv6 is, of course, the preferred solution. While deployment is in progress, SPs are forced by business imperatives to maintain support for IPv4. This note addresses the IPv4 part of the network when a CGN solution is in use.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7422"/>
          <seriesInfo name="DOI" value="10.17487/RFC7422"/>
        </reference>
        <reference anchor="RFC9099">
          <front>
            <title>Operational Security Considerations for IPv6 Networks</title>
            <author fullname="É. Vyncke" surname="É. Vyncke"/>
            <author fullname="K. Chittimaneni" initials="K." surname="Chittimaneni"/>
            <author fullname="M. Kaeo" initials="M." surname="Kaeo"/>
            <author fullname="E. Rey" initials="E." surname="Rey"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>Knowledge and experience on how to operate IPv4 networks securely is available, whether the operator is an Internet Service Provider (ISP) or an enterprise internal network. However, IPv6 presents some new security challenges. RFC 4942 describes security issues in the protocol, but network managers also need a more practical, operations-minded document to enumerate advantages and/or disadvantages of certain choices.</t>
              <t>This document analyzes the operational security issues associated with several types of networks and proposes technical and procedural mitigation techniques. This document is only applicable to managed networks, such as enterprise networks, service provider networks, or managed residential networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9099"/>
          <seriesInfo name="DOI" value="10.17487/RFC9099"/>
        </reference>
        <reference anchor="RFC5952">
          <front>
            <title>A Recommendation for IPv6 Address Text Representation</title>
            <author fullname="S. Kawamura" initials="S." surname="Kawamura"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>As IPv6 deployment increases, there will be a dramatic increase in the need to use IPv6 addresses in text. While the IPv6 address architecture in Section 2.2 of RFC 4291 describes a flexible model for text representation of an IPv6 address, this flexibility has been causing problems for operators, system engineers, and users. This document defines a canonical textual representation format. It does not define a format for internal storage, such as within an application or database. It is expected that the canonical format will be followed by humans and systems when representing IPv6 addresses as text, but all implementations must accept and be able to handle any legitimate RFC 4291 format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5952"/>
          <seriesInfo name="DOI" value="10.17487/RFC5952"/>
        </reference>
        <reference anchor="RFC7510">
          <front>
            <title>Encapsulating MPLS in UDP</title>
            <author fullname="X. Xu" initials="X." surname="Xu"/>
            <author fullname="N. Sheth" initials="N." surname="Sheth"/>
            <author fullname="L. Yong" initials="L." surname="Yong"/>
            <author fullname="R. Callon" initials="R." surname="Callon"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document specifies an IP-based encapsulation for MPLS, called MPLS-in-UDP for situations where UDP (User Datagram Protocol) encapsulation is preferred to direct use of MPLS, e.g., to enable UDP-based ECMP (Equal-Cost Multipath) or link aggregation. The MPLS- in-UDP encapsulation technology must only be deployed within a single network (with a single network operator) or networks of an adjacent set of cooperating network operators where traffic is managed to avoid congestion, rather than over the Internet where congestion control is required. Usage restrictions apply to MPLS-in-UDP usage for traffic that is not congestion controlled and to UDP zero checksum usage with IPv6.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7510"/>
          <seriesInfo name="DOI" value="10.17487/RFC7510"/>
        </reference>
        <reference anchor="RFC4360">
          <front>
            <title>BGP Extended Communities Attribute</title>
            <author fullname="S. Sangli" initials="S." surname="Sangli"/>
            <author fullname="D. Tappan" initials="D." surname="Tappan"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes the "extended community" BGP-4 attribute. This attribute provides a mechanism for labeling information carried in BGP-4. These labels can be used to control the distribution of this information, or for other applications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4360"/>
          <seriesInfo name="DOI" value="10.17487/RFC4360"/>
        </reference>
        <reference anchor="RFC1997">
          <front>
            <title>BGP Communities Attribute</title>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <author fullname="P. Traina" initials="P." surname="Traina"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <date month="August" year="1996"/>
            <abstract>
              <t>This document describes an extension to BGP which may be used to pass additional information to both neighboring and remote BGP peers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1997"/>
          <seriesInfo name="DOI" value="10.17487/RFC1997"/>
        </reference>
        <reference anchor="I-D.cbs-teas-5qi-to-dscp-mapping">
          <front>
            <title>5QI to DiffServ DSCP Mapping Example for Enforcement of 5G End-to-End Network Slice QoS</title>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Ivan Bykov" initials="I." surname="Bykov">
              <organization>Ribbon Communications</organization>
            </author>
            <author fullname="Krzysztof Grzegorz Szarkowicz" initials="K. G." surname="Szarkowicz">
              <organization>Juniper Networks</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   5G End-to-End Network Slice QoS is an essential aspect of network
   slicing, as described in both IETF drafts and the 3GPP
   specifications.  Network slicing allows for the creation of multiple
   logical networks on top of a shared physical infrastructure, tailored
   to support specific use cases or services.  The primary goal of QoS
   in network slicing is to ensure that the specific performance
   requirements of each slice are met, including latency, reliability,
   and throughput.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-cbs-teas-5qi-to-dscp-mapping-02"/>
        </reference>
        <reference anchor="RFC2475">
          <front>
            <title>An Architecture for Differentiated Services</title>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <author fullname="M. Carlson" initials="M." surname="Carlson"/>
            <author fullname="E. Davies" initials="E." surname="Davies"/>
            <author fullname="Z. Wang" initials="Z." surname="Wang"/>
            <author fullname="W. Weiss" initials="W." surname="Weiss"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines an architecture for implementing scalable service differentiation in the Internet. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2475"/>
          <seriesInfo name="DOI" value="10.17487/RFC2475"/>
        </reference>
        <reference anchor="RFC2698">
          <front>
            <title>A Two Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Two Rate Three Color Marker (trTCM), which can be used as a component in a Diffserv traffic conditioner. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2698"/>
          <seriesInfo name="DOI" value="10.17487/RFC2698"/>
        </reference>
        <reference anchor="RFC4115">
          <front>
            <title>A Differentiated Service Two-Rate, Three-Color Marker with Efficient Handling of in-Profile Traffic</title>
            <author fullname="O. Aboul-Magd" initials="O." surname="Aboul-Magd"/>
            <author fullname="S. Rabie" initials="S." surname="Rabie"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This document describes a two-rate, three-color marker that has been in use for data services including Frame Relay services. This marker can be used for metering per-flow traffic in the emerging IP and L2 VPN services. The marker defined here is different from previously defined markers in the handling of the in-profile traffic. Furthermore, this marker doesn't impose peak-rate shaping requirements on customer edge (CE) devices. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4115"/>
          <seriesInfo name="DOI" value="10.17487/RFC4115"/>
        </reference>
        <reference anchor="RFC7806">
          <front>
            <title>On Queuing, Marking, and Dropping</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="R. Pan" initials="R." surname="Pan"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This note discusses queuing and marking/dropping algorithms. While these algorithms may be implemented in a coupled manner, this note argues that specifications, measurements, and comparisons should decouple the different algorithms and their contributions to system behavior.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7806"/>
          <seriesInfo name="DOI" value="10.17487/RFC7806"/>
        </reference>
        <reference anchor="RFC2474">
          <front>
            <title>Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers</title>
            <author fullname="K. Nichols" initials="K." surname="Nichols"/>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines the IP header field, called the DS (for differentiated services) field. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2474"/>
          <seriesInfo name="DOI" value="10.17487/RFC2474"/>
        </reference>
        <reference anchor="RFC8100">
          <front>
            <title>Diffserv-Interconnection Classes and Practice</title>
            <author fullname="R. Geib" initials="R." role="editor" surname="Geib"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>This document defines a limited common set of Diffserv Per-Hop Behaviors (PHBs) and Diffserv Codepoints (DSCPs) to be applied at (inter)connections of two separately administered and operated networks, and it explains how this approach can simplify network configuration and operation. Many network providers operate Multiprotocol Label Switching (MPLS) using Treatment Aggregates for traffic marked with different Diffserv Per-Hop Behaviors and use MPLS for interconnection with other networks. This document offers a simple interconnection approach that may simplify operation of Diffserv for network interconnection among providers that use MPLS and apply the Short Pipe Model. While motivated by the requirements of MPLS network operators that use Short Pipe Model tunnels, this document is applicable to other networks, both MPLS and non-MPLS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8100"/>
          <seriesInfo name="DOI" value="10.17487/RFC8100"/>
        </reference>
        <reference anchor="RFC3209">
          <front>
            <title>RSVP-TE: Extensions to RSVP for LSP Tunnels</title>
            <author fullname="D. Awduche" initials="D." surname="Awduche"/>
            <author fullname="L. Berger" initials="L." surname="Berger"/>
            <author fullname="D. Gan" initials="D." surname="Gan"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <author fullname="V. Srinivasan" initials="V." surname="Srinivasan"/>
            <author fullname="G. Swallow" initials="G." surname="Swallow"/>
            <date month="December" year="2001"/>
            <abstract>
              <t>This document describes the use of RSVP (Resource Reservation Protocol), including all the necessary extensions, to establish label-switched paths (LSPs) in MPLS (Multi-Protocol Label Switching). Since the flow along an LSP is completely identified by the label applied at the ingress node of the path, these paths may be treated as tunnels. A key application of LSP tunnels is traffic engineering with MPLS as specified in RFC 2702. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3209"/>
          <seriesInfo name="DOI" value="10.17487/RFC3209"/>
        </reference>
        <reference anchor="RFC9256">
          <front>
            <title>Segment Routing Policy Architecture</title>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
              <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9256"/>
          <seriesInfo name="DOI" value="10.17487/RFC9256"/>
        </reference>
        <reference anchor="RFC9350">
          <front>
            <title>IGP Flexible Algorithm</title>
            <author fullname="P. Psenak" initials="P." role="editor" surname="Psenak"/>
            <author fullname="S. Hegde" initials="S." surname="Hegde"/>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." surname="Talaulikar"/>
            <author fullname="A. Gulko" initials="A." surname="Gulko"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>IGP protocols historically compute the best paths over the network based on the IGP metric assigned to the links. Many network deployments use RSVP-TE or Segment Routing - Traffic Engineering (SR-TE) to steer traffic over a path that is computed using different metrics or constraints than the shortest IGP path. This document specifies a solution that allows IGPs themselves to compute constraint-based paths over the network. This document also specifies a way of using Segment Routing (SR) Prefix-SIDs and SRv6 locators to steer packets along the constraint-based paths.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9350"/>
          <seriesInfo name="DOI" value="10.17487/RFC9350"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC5440">
          <front>
            <title>Path Computation Element (PCE) Communication Protocol (PCEP)</title>
            <author fullname="JP. Vasseur" initials="JP." role="editor" surname="Vasseur"/>
            <author fullname="JL. Le Roux" initials="JL." role="editor" surname="Le Roux"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the Path Computation Element (PCE) Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a PCE, or between two PCEs. Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering. PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5440"/>
          <seriesInfo name="DOI" value="10.17487/RFC5440"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
            <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
              <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC9330">
          <front>
            <title>Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture</title>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="G. White" initials="G." surname="White"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This document describes the L4S architecture, which enables Internet applications to achieve low queuing latency, low congestion loss, and scalable throughput control. L4S is based on the insight that the root cause of queuing delay is in the capacity-seeking congestion controllers of senders, not in the queue itself. With the L4S architecture, all Internet applications could (but do not have to) transition away from congestion control algorithms that cause substantial queuing delay and instead adopt a new class of congestion controls that can seek capacity with very little queuing. These are aided by a modified form of Explicit Congestion Notification (ECN) from the network. With this new architecture, applications can have both low latency and high throughput.</t>
              <t>The architecture primarily concerns incremental deployment. It defines mechanisms that allow the new class of L4S congestion controls to coexist with 'Classic' congestion controls in a shared network. The aim is for L4S latency and throughput to be usually much better (and rarely worse) while typically not impacting Classic performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9330"/>
          <seriesInfo name="DOI" value="10.17487/RFC9330"/>
        </reference>
        <reference anchor="RFC6291">
          <front>
            <title>Guidelines for the Use of the "OAM" Acronym in the IETF</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson"/>
            <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <author fullname="S. Mansfield" initials="S." surname="Mansfield"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>At first glance, the acronym "OAM" seems to be well-known and well-understood. Looking at the acronym a bit more closely reveals a set of recurring problems that are revisited time and again.</t>
              <t>This document provides a definition of the acronym "OAM" (Operations, Administration, and Maintenance) for use in all future IETF documents that refer to OAM. There are other definitions and acronyms that will be discussed while exploring the definition of the constituent parts of the "OAM" term. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="161"/>
          <seriesInfo name="RFC" value="6291"/>
          <seriesInfo name="DOI" value="10.17487/RFC6291"/>
        </reference>
        <reference anchor="RFC7276">
          <front>
            <title>An Overview of Operations, Administration, and Maintenance (OAM) Tools</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="N. Sprecher" initials="N." surname="Sprecher"/>
            <author fullname="E. Bellagamba" initials="E." surname="Bellagamba"/>
            <author fullname="Y. Weingarten" initials="Y." surname="Weingarten"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>Operations, Administration, and Maintenance (OAM) is a general term that refers to a toolset for fault detection and isolation, and for performance measurement. Over the years, various OAM tools have been defined for various layers in the protocol stack.</t>
              <t>This document summarizes some of the OAM tools defined in the IETF in the context of IP unicast, MPLS, MPLS Transport Profile (MPLS-TP), pseudowires, and Transparent Interconnection of Lots of Links (TRILL). This document focuses on tools for detecting and isolating failures in networks and for performance monitoring. Control and management aspects of OAM are outside the scope of this document. Network repair functions such as Fast Reroute (FRR) and protection switching, which are often triggered by OAM protocols, are also out of the scope of this document.</t>
              <t>The target audience of this document includes network equipment vendors, network operators, and standards development organizations. This document can be used as an index to some of the main OAM tools defined in the IETF. At the end of the document, a list of the OAM toolsets and a list of the OAM functions are presented as a summary.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7276"/>
          <seriesInfo name="DOI" value="10.17487/RFC7276"/>
        </reference>
        <reference anchor="RFC5286">
          <front>
            <title>Basic Specification for IP Fast Reroute: Loop-Free Alternates</title>
            <author fullname="A. Atlas" initials="A." role="editor" surname="Atlas"/>
            <author fullname="A. Zinin" initials="A." role="editor" surname="Zinin"/>
            <date month="September" year="2008"/>
            <abstract>
              <t>This document describes the use of loop-free alternates to provide local protection for unicast traffic in pure IP and MPLS/LDP networks in the event of a single failure, whether link, node, or shared risk link group (SRLG). The goal of this technology is to reduce the packet loss that happens while routers converge after a topology change due to a failure. Rapid failure repair is achieved through use of precalculated backup next-hops that are loop-free and safe to use until the distributed network convergence process completes. This simple approach does not require any support from other routers. The extent to which this goal can be met by this specification is dependent on the topology of the network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5286"/>
          <seriesInfo name="DOI" value="10.17487/RFC5286"/>
        </reference>
        <reference anchor="RFC5714">
          <front>
            <title>IP Fast Reroute Framework</title>
            <author fullname="M. Shand" initials="M." surname="Shand"/>
            <author fullname="S. Bryant" initials="S." surname="Bryant"/>
            <date month="January" year="2010"/>
            <abstract>
              <t>This document provides a framework for the development of IP fast- reroute mechanisms that provide protection against link or router failure by invoking locally determined repair paths. Unlike MPLS fast-reroute, the mechanisms are applicable to a network employing conventional IP routing and forwarding. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5714"/>
          <seriesInfo name="DOI" value="10.17487/RFC5714"/>
        </reference>
        <reference anchor="RFC8355">
          <front>
            <title>Resiliency Use Cases in Source Packet Routing in Networking (SPRING) Networks</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document identifies and describes the requirements for a set of use cases related to Segment Routing network resiliency on Source Packet Routing in Networking (SPRING) networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8355"/>
          <seriesInfo name="DOI" value="10.17487/RFC8355"/>
        </reference>
        <reference anchor="RFC9375">
          <front>
            <title>A YANG Data Model for Network and VPN Service Performance Monitoring</title>
            <author fullname="B. Wu" initials="B." role="editor" surname="Wu"/>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <date month="April" year="2023"/>
            <abstract>
              <t>The data model for network topologies defined in RFC 8345 introduces vertical layering relationships between networks that can be augmented to cover network and service topologies. This document defines a YANG module for performance monitoring (PM) of both underlay networks and overlay VPN services that can be used to monitor and manage network performance on the topology of both layers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9375"/>
          <seriesInfo name="DOI" value="10.17487/RFC9375"/>
        </reference>
        <reference anchor="RFC7799">
          <front>
            <title>Active and Passive Metrics and Methods (with Hybrid Types In-Between)</title>
            <author fullname="A. Morton" initials="A." surname="Morton"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This memo provides clear definitions for Active and Passive performance assessment. The construction of Metrics and Methods can be described as either "Active" or "Passive". Some methods may use a subset of both Active and Passive attributes, and we refer to these as "Hybrid Methods". This memo also describes multiple dimensions to help evaluate new methods as they emerge.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7799"/>
          <seriesInfo name="DOI" value="10.17487/RFC7799"/>
        </reference>
        <reference anchor="RFC8641">
          <front>
            <title>Subscription to YANG Notifications for Datastore Updates</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8641"/>
          <seriesInfo name="DOI" value="10.17487/RFC8641"/>
        </reference>
        <reference anchor="RFC4365">
          <front>
            <title>Applicability Statement for BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document provides an Applicability Statement for the Virtual Private Network (VPN) solution described in RFC 4364 and other documents listed in the References section. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4365"/>
          <seriesInfo name="DOI" value="10.17487/RFC4365"/>
        </reference>
        <reference anchor="RFC6624">
          <front>
            <title>Layer 2 Virtual Private Networks Using BGP for Auto-Discovery and Signaling</title>
            <author fullname="K. Kompella" initials="K." surname="Kompella"/>
            <author fullname="B. Kothari" initials="B." surname="Kothari"/>
            <author fullname="R. Cherukuri" initials="R." surname="Cherukuri"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>Layer 2 Virtual Private Networks (L2VPNs) based on Frame Relay or ATM circuits have been around a long time; more recently, Ethernet VPNs, including Virtual Private LAN Service, have become popular. Traditional L2VPNs often required a separate Service Provider infrastructure for each type and yet another for the Internet and IP VPNs. In addition, L2VPN provisioning was cumbersome. This document presents a new approach to the problem of offering L2VPN services where the L2VPN customer's experience is virtually identical to that offered by traditional L2VPNs, but such that a Service Provider can maintain a single network for L2VPNs, IP VPNs, and the Internet, as well as a common provisioning methodology for all services. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6624"/>
          <seriesInfo name="DOI" value="10.17487/RFC6624"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ns-controller-models">
          <front>
            <title>IETF Network Slice Controller and its associated data models</title>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>NVIDIA</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This document describes a potential division in major functional
   components of an IETF Network Slice Controller (NSC) as well as
   references the data models required for supporting the requests of
   IETF network slice services and their realization.

   This document describes a potential way of structuring the IETF
   Network Slice Controller as well as how to use different data models
   being defined for IETF Network Slice Service provision (and how they
   are related).  It is not the purpose of this document to standardize
   or constrain the implementation the IETF Network Slice Controller.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ns-controller-models-02"/>
        </reference>
        <reference anchor="RFC6459">
          <front>
            <title>IPv6 in 3rd Generation Partnership Project (3GPP) Evolved Packet System (EPS)</title>
            <author fullname="J. Korhonen" initials="J." role="editor" surname="Korhonen"/>
            <author fullname="J. Soininen" initials="J." surname="Soininen"/>
            <author fullname="B. Patil" initials="B." surname="Patil"/>
            <author fullname="T. Savolainen" initials="T." surname="Savolainen"/>
            <author fullname="G. Bajko" initials="G." surname="Bajko"/>
            <author fullname="K. Iisakkila" initials="K." surname="Iisakkila"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>The use of cellular broadband for accessing the Internet and other data services via smartphones, tablets, and notebook/netbook computers has increased rapidly as a result of high-speed packet data networks such as HSPA, HSPA+, and now Long-Term Evolution (LTE) being deployed. Operators that have deployed networks based on 3rd Generation Partnership Project (3GPP) network architectures are facing IPv4 address shortages at the Internet registries and are feeling pressure to migrate to IPv6. This document describes the support for IPv6 in 3GPP network architectures. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6459"/>
          <seriesInfo name="DOI" value="10.17487/RFC6459"/>
        </reference>
      </references>
    </references>
    <?line 2358?>

<section anchor="ext-abbr">
      <name>Acronyms and Abbreviations</name>
      <t>3GPP: 3rd Generation Partnership Project</t>
      <t>5GC: 5G Core</t>
      <t>5QI: 5G QoS Indicator</t>
      <t>A2A: Any-to-Any</t>
      <t>AC: Attachment Circuit</t>
      <t>AMF: Access and Mobility Management Function</t>
      <t>AUSF: Authentication Server Function</t>
      <t>BBU: Baseband Unit</t>
      <t>BH: Backhaul</t>
      <t>BS: Base Station</t>
      <t>CE: Customer Edge</t>
      <t>CIR: Committed Information Rate</t>
      <t>CN: Core Network</t>
      <t>CoS: Class of Service</t>
      <t>CP: Control Plane</t>
      <t>CU: Centralized Unit</t>
      <t>CU-CP: Centralized Unit Control Plane</t>
      <t>CU-UP: Centralized Unit User Plane</t>
      <t>DC: Data Center</t>
      <t>DDoS: Distributed Denial of Services</t>
      <t>DN: Data Network</t>
      <t>DSCP: Differentiated Services Code Point</t>
      <t>DU: Distributed Unit</t>
      <t>eCPRI: enhanced Common Public Radio Interface</t>
      <t>FH: Fronthaul</t>
      <t>FIB: Forwarding Information Base</t>
      <t>GPRS: Generic Packet Radio Service</t>
      <t>gNB: gNodeB</t>
      <t>GTP: GPRS Tunneling Protocol</t>
      <t>GTP-U: GPRS Tunneling Protocol User plane</t>
      <t>IGP: Interior Gateway Protocol</t>
      <t>L2VPN: Layer 2 Virtual Private Network</t>
      <t>L3VPN: Layer 3 Virtual Private Network</t>
      <t>LSP: Label Switched Path</t>
      <t>MH: Midhaul</t>
      <t>MIoT: Massive Internet of Things</t>
      <t>MPLS: Multiprotocol Label Switching</t>
      <t>NF: Network Function</t>
      <t>NRF: Network Function Repository</t>
      <t>NRP: Network Resource Partition</t>
      <t>NSC: Network Slice Controller</t>
      <t>PE: Provider Edge</t>
      <t>PIR: Peak Information Rate</t>
      <t>QoS: Quality of Service</t>
      <t>RAN: Radio Access Network</t>
      <t>RIB: Routing Information Base</t>
      <t>RSVP: Resource Reservation Protocol</t>
      <t>RU: Radio Unit</t>
      <t>SD: Slice Differentiator</t>
      <t>SDP: Service Demarcation Point</t>
      <t>SLA: Service Level Agreement</t>
      <t>SLO: Service Level Objective</t>
      <t>SMF: Session Management Function</t>
      <t>S-NSSAI: Single Network Slice Selection Assistance Information</t>
      <t>SST: Slice/Service Type</t>
      <t>SR: Segment Routing</t>
      <t>SRv6: Segment Routing version 6</t>
      <t>TC: Traffic Class</t>
      <t>TE: Traffic Engineering</t>
      <t>TN: Transport Network</t>
      <t>UDM: Unified Data Management</t>
      <t>UE: User Equipment</t>
      <t>UP: User Plane</t>
      <t>UPF: User Plane Function</t>
      <t>URLLC: Ultra Reliable Low Latency Communication</t>
      <t>VLAN: Virtual Local Area Network</t>
      <t>VNF: Virtual Network Function</t>
      <t>VPN: Virtual Private Network</t>
      <t>VRF: Virtual Routing and Forwarding</t>
      <t>VXLAN: Virtual Extensible Local Area Network</t>
    </section>
    <section anchor="sec-5g-overview">
      <name>An Overview of 5G Networking</name>
      <t>This section provides a brief introduction to 5G mobile networking
   with a perspective on the Transport Network.  This section does not
   intend to replace or define 3GPP architecture, instead its objective is to provide an
   overview for readers that do not have a mobile background.  For
   more comprehensive information, refer to <xref target="TS-23.501"/>.</t>
      <section anchor="key-building-blocks">
        <name>Key Building Blocks</name>
        <t><xref target="TS-23.501"/> defines the Network Functions (UPF, Access and Mobility Function (AMF), etc.) that
   compose the 5G System (5GS) Architecture together with related
   interfaces (e.g., N1 and N2).  This architecture has built-in control
   and user plane separation, and the control plane leverages a Service-
   Based Architecture (SBA).  <xref target="_figure-28"/> outlines an example 5GS architecture
   with a subset of possible NFs and network interfaces.</t>
        <figure anchor="_figure-28">
          <name>5GS Architecture and Service-based Interfaces</name>
          <artwork align="center"><![CDATA[
  +-----+  +-----+  +-----+    +-----+  +-----+  +-----+
  |NSSF |  | NEF |  | NRF |    | PCF |  | UDM |  | AF  |
  +--+--+  +--+--+  +--+--+    +--+--+  +--+--+  +--+--+
Nnssf|    Nnef|    Nnrf|      Npcf|    Nudm|        |Naf
  ---+--------+--+-----+----------+---+----+--------+----
            Nausf|    Namf|       Nsmf|
              +--+--+  +--+--+     +--+------+
              |AUSR |  | AMF |     |   SMF   |
              +-----+  +--+--+     +--+------+
                       /  |           |      \
Control Plane      N1 /   |N2         |N4     \N4
------------------------------------------------------------
User Plane          /     |           |         \
                +---+  +--+--+  N3 +--+--+ N9 +-----+ N6  .---.
                |UE +--+(R)AN+-----+ UPF +----+ UPF +----( DN  )
                +---+  +-----+     +-----+    +-----+     '---'
]]></artwork>
        </figure>
        <t>Similar to previous versions of 3GPP mobile networks <xref target="RFC6459"/>, a 5G mobile network is split
   into the following four major domains (<xref target="_figure-29"/>):</t>
        <ul spacing="normal">
          <li>
            <t>UE, MS, MN, and Mobile:  </t>
            <t>
The terms User Equipment (UE), Mobile Station (MS), Mobile
Node (MN), and mobile refer to the devices that are hosts with the
ability to obtain Internet connectivity via a 3GPP network.  An MS
is comprised of a Terminal Equipment (TE) and a Mobile Terminal
(MT).</t>
          </li>
          <li>
            <t>Radio Access Network (RAN):  </t>
            <t>
Provides wireless connectivity to UEs. A RAN is
made up of the Antenna that transmits and receives signals to
UEs and the Base Station that digitizes the signal and converts the
Radio Frequency (RF) data stream to IP packets.</t>
          </li>
          <li>
            <t>Core Network (CN):  </t>
            <t>
Controls the CP of the RAN and provides connectivity to the Data
Network (e.g., the Internet or a private VPN).  The Core Network
hosts dozens of services such as authentication, phone registry,
charging, access to Public Switched Telephony Network (PSTN) and handover.</t>
          </li>
          <li>
            <t>Transport Network (TN):  </t>
            <t>
Provides connectivity between 5G NFs.  The TN may provide connectivity from the RAN to the CN as well as  within the RAN or within the CN.  The
traffic generated by NFs is - mostly - based on IP or Ethernet.</t>
          </li>
        </ul>
        <figure anchor="_figure-29">
          <name>Building Blocks of 5G Architecture (A High-Level Representation)</name>
          <artwork align="center"><![CDATA[
+----------------------------------------------+
|             +------------+    +------------+ |
| +----+      |            |    |            | |   .-------.
| | UE +------+    RAN     |    |     CN     +----(    DN   )
| +----+      |            |    |            | |   '-------'
|             +------+-----+    +------+-----+ |
|                    |                 |       |
|              +-----+-----------------+----+  |
|              |     Transport Network      |  |
|              +----------------------------+  |
|                                              |
|                    5G System                 |
+----------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="core-network-cn">
        <name>Core Network (CN)</name>
        <t>The 5G Core Network (5GC) is made up of a set of NFs which fall into two main categories (<xref target="_figure-30"/>):</t>
        <ul spacing="normal">
          <li>
            <t>5GC User Plane:  </t>
            <t>
The UPF is the interconnect
point between the mobile infrastructure and the Data Network (DN).
It interfaces with the RAN via the N3 interface by encapsulating/
decapsulating the user plane traffic in GTP tunnels (aka GTP-U or
Mobile user plane).</t>
          </li>
          <li>
            <t>5GC Control Plane:  </t>
            <t>
The 5G control plane is made up of a
comprehensive set of NFs.  The description of these entities is out of the scope of this
document. The following NFs and interfaces are worth mentioning,
since their connectivity may rely on the Transport Network:  </t>
            <ul spacing="normal">
              <li>
                <t>the AMF connects with the RAN control plane over the N2 interface</t>
              </li>
              <li>
                <t>the SMF controls the 5GC UPF via the N4 interface</t>
              </li>
            </ul>
          </li>
        </ul>
        <figure anchor="_figure-30">
          <name>5G Core Network (CN)</name>
          <artwork align="center"><![CDATA[
  +---------+    +-------------------------+
  |   RAN   |    |      5G Core (5GC)      |
  |         |    |                         |
  |         |    |   [AUSF  NRF  UDM ...]  |
  |         |    |         (SBA)           |
  |         |    |                         |
  |         | N2 |   +-----+ N11 +-----+   |
  |    CP -----------+ AMF +-----+ SMF |   |
  |         |    |   +-----+     +--+--+   |
  |         |    |                  |      |  Control Plane
-----------------------------------------------------------
  |         |    |                  | N4   |  User Plane
  |         | N3 |               +--+--+   | N6  .-------.
  |    UP -----------------------+ UPF +------->(   DN    )
  |         |    |               +-----+   |     `-------'
  +---------+    +-------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="radio-access-network-ran">
        <name>Radio Access Network (RAN)</name>
        <t>The RAN connects cellular wireless devices to
   a mobile Core Network.  The RAN is made up of three components,
   which form the Radio Base Station:</t>
        <ul spacing="normal">
          <li>
            <t>The Baseband Unit (BBU) provides the interface between the Core
Network and the Radio Network.  It connects to the Radio Unit and
is responsible for the baseband signal processing to packet.</t>
          </li>
          <li>
            <t>The Radio Unit (RU) is located close to the Antenna and controlled
by the BBU.  It converts the Baseband signal received from the BBU
to a Radio frequency signal.</t>
          </li>
          <li>
            <t>The Antenna converts the electric signal received from the RU to
radio waves</t>
          </li>
        </ul>
        <t>The 5G RAN Base Station is called a gNodeB (gNB).  It connects to the
   Core Network via the N3 (User Plane) and N2 (Control Plane)
   interfaces.</t>
        <t>The 5G RAN architecture supports RAN disaggregation in various ways.
   Notably, the BBU can be split into a DU (Distributed Unit) for
   digital signal processing and a CU (Centralized Unit) for RAN Layer 3
   processing.  Furthermore, the CU can be itself split into Control
   Plane (CU-CP) and User Plane (CU-UP).</t>
        <t><xref target="_figure-31"/> depicts a disaggregated RAN with NFs and interfaces.</t>
        <figure anchor="_figure-31">
          <name>RAN Disaggregation</name>
          <artwork align="center"><![CDATA[
            +---------------------------------+    +-----------+
            |                                 | N3 |           |
+----+  NR  |                                 +----+  5G Core  |
| UE +------+             gNodeB              |    |           |
+----+      |                                 +----+   (5GC)   |
            |                                 | N2 |           |
            +---------------------------------+    +-----------+
                            | |
                           .+ +.
                           \   /
                            \ /
            +---------------------------------+    +-----------+
            |           +-------------------+ |    |           |
            |           |                   | |    |           |
+----+  NR  | +----+ F2 |+----+ F1-U +-----+| | N3 |  +-----+  |
| UE +--------+ RU +-----+ DU +------+CU-UP+----------+ UPF |  |
+----+      | +----+    |+-+--+      +--+--+| |    |  +-----+  |
            |           |  |            |E1 | |    |           |
            |           |  | F1-C       |   | |    |           |
            |           |  |         +--+--+| | N2 |  +-----+  |
            |           |  +---------+CU-CP+----------+ AMF |  |
            |           |            +-----+| |    |  +-----+  |
            |           |     BBU split     | |    |  5G Core  |
            |           +-------------------+ |    |           |
            |       Disaggregated gNodeB      |    |           |
            +---------------------------------+    +-----------+
]]></artwork>
        </figure>
      </section>
      <section anchor="transport-network-tn">
        <name>Transport Network (TN)</name>
        <t>The 5G transport architecture defines three main segments for the
   Transport Network, which are commonly referred to as Fronthaul (FH),
   Midhaul (MH), and Backhaul (BH) <xref target="TR-GSTR-TN5G"/>:</t>
        <ul spacing="normal">
          <li>
            <t>Fronthaul happens before the BBU processing.  In 5G, this
interface is based on eCPRI with Ethernet
or IP encapsulation.</t>
          </li>
          <li>
            <t>Midhaul is optional: this segment is introduced in the BBU split
presented in Appendix B.3, where Midhaul network refers to the DU-
CU interconnection (i.e., F1 interface).  At this level, all
traffic is encapsulated in IP (signaling and user plane).</t>
          </li>
          <li>
            <t>Backhaul happens after BBU processing.  Therefore, it maps to the
interconnection between the RAN and the CN.  All traffic
is encapsulated in IP.</t>
          </li>
        </ul>
        <t><xref target="_figure-32"/> illustrates the different segments of the Transport Network
   with the relevant NFs.</t>
        <figure anchor="_figure-32">
          <name>5G Transport Segments</name>
          <artwork align="center"><![CDATA[
+---------------------------------------------------------+
|                    Transport Network                    |
|                                                         |
|    Fronthaul       Midhaul       Backhaul               |
|  +-----------+ +------------+ +-----------+             |
|  |           | |            | |           |             |
+--|-----------|-|------------|-|-----------|-------------+
 +-+--+      +-+-++         +-+-++        +-+---+     .---.
 | RU |      | DU |         | CU |        | UPF :----( DN  )
 +----+      +----+         +----+        +-----+     `---'
]]></artwork>
        </figure>
        <t>A given part of the transport network can
   carry several 5G transport segments concurrently, as outlined in
   <xref target="_figure-33"/>.  This is because different types of 5G NFs
   might be placed in the same location (e.g., the UPF from one slice
   might be placed in the same location as the CU-UP from another
   slice).</t>
        <figure anchor="_figure-33">
          <name>Concurrent 5G Transport Segments</name>
          <artwork align="center"><![CDATA[
+---------+
|+----+   | Colocated
||RU-1|   | RU/DU
|+-+--+   |
|  | FH-1 |
|+-+--+   |
||DU-1|   |  +----+         +-----+         .---.
|+-+--+   |  |CU-1|         |UPF-1+--------( DN  )
+--|------+  +-+-++         +-+---+         `---'
+--|-----------|-|------------|----------------------------+
|  |    MH-1   | |    BH-1    |          Transport Network |
|  +-----------+ +------------+                            |
|  +-----------+ +------------+ +-----------+              |
|  |    FH-2   | |    MH-2    | |    BH-2   |              |
+--|-----------|-|------------|-|-----------|--------------+
 +-+--+      +-+-++         +-+-++        +-+---+     .---.
 |RU-2|      |DU-2|         |CU-2|        |UPF-2+----( DN  )
 +----+      +----+         +----+        +-----+     `---'
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Adrian Farrel, Joel Halpern, Tarek
   Saad, Greg Mirsky, Rüdiger Geib, Nicklous D. Morris,         Daniele Ceccarelli, Bo Wu, Xuesong Geng, and Deborah Brungard for
   their review of this document and for providing valuable comments.</t>
      <t>Special thanks to Jie Dong and Adrian Farrel for the detailed and careful reviews.</t>
      <t>Thanks to Alvaro Retana for the rtg-dir review, Yoshifumi Nishida for
   the tsv-art review, and Timothy Winters for the int-dir review.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="John Drake">
        <organization/>
        <address>
          <postal>
            <city>Sunnyvale</city>
            <country>United States of America</country>
          </postal>
          <email>je_drake@yahoo.com</email>
        </address>
      </contact>
      <contact fullname="Ivan Bykov">
        <organization>Ribbon Communications</organization>
        <address>
          <postal>
            <city>Tel Aviv</city>
            <country>Israel</country>
          </postal>
          <email>ivan.bykov@rbbn.com</email>
        </address>
      </contact>
      <contact fullname="Reza Rokui">
        <organization>Ciena</organization>
        <address>
          <postal>
            <city>Ottawa</city>
            <country>Canada</country>
          </postal>
          <email>rrokui@ciena.com</email>
        </address>
      </contact>
      <contact fullname="Luay Jalil">
        <organization>Verizon</organization>
        <address>
          <postal>
            <city>Dallas, TX</city>
            <country>United States of America</country>
          </postal>
          <email>luay.jalil@verizon.com</email>
        </address>
      </contact>
      <contact fullname="Beny Dwi Setyawan">
        <organization>XL Axiata</organization>
        <address>
          <postal>
            <city>Jakarta</city>
            <country>Indonesia</country>
          </postal>
          <email>benyds@xl.co.id</email>
        </address>
      </contact>
      <contact fullname="Amit Dhamija">
        <organization>Rakuten</organization>
        <address>
          <postal>
            <city>Bangalore</city>
            <country>India</country>
          </postal>
          <email>amitd@arrcus.com</email>
        </address>
      </contact>
      <contact fullname="Mojdeh Amani">
        <organization>British Telecom</organization>
        <address>
          <postal>
            <city>London</city>
            <country>United Kingdom</country>
          </postal>
          <email>mojdeh.amani@bt.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
